Professional Documents
Culture Documents
Burt Kaliski, RSA Laboratories World Wireless Congress May 28, 2003
Introduction
Cryptography plays a central role in the wireless world Emerging wireless world will require new types of security One cryptographers perspective on interesting things to come
VPN
Portal
VPN Portal
The wireless world today and in the near future is like the wired world without as many wires.
Liberty Alliance is one forum for this work and currently includes participation from many wireless vendors
300
250
# of Access Points
200
150
100
Authentication, access control, and encryption solutions are available, but must be used
50
0 2001 2002
VPN Portal
Emerging wireless world is unlike the wired world where no wires have gone before.
A Proliferation of Devices
Enabled by wireless technologies, almost anything will soon be connected
Cameras Sensors Product tags Currency
Privacy Challenges
Anything connected can potentially be tracked Who should be able to track what? Balancing business benefits and privacy
e.g., track the product in the store, but not on the consumer
Networking Challenges
Anything can be connected, but to what? Devices will need to connect to each other and the network through each other But how can devices trust each other to connect reliably? Again new options from cryptography
Multi-Hop Cellular
Advantages of multi-hop cellular:
Reduced energy consumption Reduced interference Fewer base stations with increased coverage Ad hoc networking
Encouraging Honesty
Honest mobile nodes will forward packets for one another Cheaters will forward just for themselves May be difficult to tell the difference How can honesty be encouraged?
Solution: Micropayments
Attach micropayments to packets
cryptographic lottery tickets related to packet and route
Micropayment schemes have been proposed for more general applications; this one is specially adapted to multi-hop
Check token
If correct, deliver packet
An RFID tag simply calls out its (unique) name or static data at a range of several meters
74AB8
Plastic #3
5F8KJ3
Other Applications
Prada, Soho NYC
Personalize / accessorize
model #4456
(cheap polyester)
The danger need not be quite so severe: There are reasonably practical ways to protect privacy.
How It Works
Tree-walking protocol for identifying tags recursively asks questions about tag serial numbers:
Is there a tag whose next bit is a 1? Is there a tag whose next bit is a 0?
Burt Kaliski Director and Chief Scientist RSA Laboratories bkaliski@rsasecurity.com +1 781 515 7073