RFID供应链分析资料 RFIDSec+Presentation.ppt
On Mitigating Covert Channels in RFID-Enabled Supply Chains,Kirti Chawla,Gabriel Robins,and Westley Weimerkirti,robins,weimercs.virginia.edu,School of Engineering and Applied ScienceDepartment of Computer ScienceUniversity of Virginia,CharlottesvilleVirginia,USAWeb:www.cs.virginia.edu,This work is supported by U.S.National Science Foundation(NSF)grant:CNS-0716635(PI:Gabriel Robins)For more details,visit:www.cs.virginia.edurobins,RFID Technology Overview,01/22,RFID Technology,Tag/TransponderReaderBackend System,FrequencyForm FactorType,AerospaceChip Timing Supply Chain,Motivating Example Supply Chains,02/22,Motivating Example Supply Chains,03/22,How?,Supply Chain Attacks Tag Tracking,04/22,Adversary Supply Chain,Supply Chain Attacks Tag Duplication,05/22,Supply Chain Attacks Tag Modification,06/22,Supply Chain Attacks Tag Modification,07/22,#,Supply Chain Attacks Reader Compromise,08/22,Evaluation I Implications(1),09/22,Pre-attack Scenario,Post-attack scenario,Brand Loyalty Switch,Evaluation I Implications(2),10/22,Brand Aversion,Pre-attack Scenario,Post-attack scenario,Mitigating Approach Model of Supply Chain,11/22,Supply Chain,Mitigating Approach Model of Supply Chain,12/22,Global Source,Global Sink,Phase Sink,Phase Source,C(Q,R)0,C(P,Q)=0,C2,C1,NMOF(A)=max(C1,C2),C:E+,Mitigating Approach Taint Checkpoints,13/22,Taint Checkpoint,Supply Chain Flow Graph:G=GUP GPP GDP,How?,Mitigating Approach Taint Check Cover,14/22,Polynomial Time ReductionVC P TCC,Taint Check Cover,Vertex Cover,NP-Complete,TCC NP,Mitigating Approach Heuristics(1),15/22,Use approximate algorithm of VC for TCC,Time complexity:O(V+E)Solution size:2OPT,Mitigating Approach Heuristics(2),16/22,Use cuts to partition graph,Algorithm dependent time-complexitySolution size:OPT to|V|,Mitigating Approach Heuristics(3),17/22,Use underlying business requirements,(1)TNR=|VT|V|,(2)CER=,TNR,CER+,|V|0,Algorithm dependent time-complexitySolution size:OPT to|V|,Mitigating Approach Local Verification Algorithm,18/22,Verifying flow locally at every taint checkpoints,Mitigating Approach Global Verification Algorithm,19/22,Verifying flow globally along a path or at central site,Core Data Structure,20/22,Layout of core data structure,Evaluation II Cost,21/22,Local verification time cost as a function of no.of taint checkpoints,Cost of solution,Local,and global(with constant and variable link cost)verification time cost as a function of no.of taint checkpoints,Countermeasures to Covert Channels,22/22,Suggested Countermeasures,Re-encryption,Pseudonyms,Direct mitigation,PUF,Passwords,Questions,Please write to:kirtics.virginia.edu Please visit:www.cs.virginia.edu/kc5dmCreative problem solving for fun and profit,Sneak Peek,WISP,Smart Environments for Assisted Living,Security and Privacy Concerns,