Reflective-Physically Unclonable Function Based System for Anti

Total Page:16

File Type:pdf, Size:1020Kb

Reflective-Physically Unclonable Function Based System for Anti Reflective-Physically Unclonable Function based System for Anti-Counterfeiting Zur Erlangung des akademischen Grades eines DOKTOR-INGENIEURS von der Fakultät für Elektrotechnik und Informationstechnik des Karlsruher Institut für Technologie (KIT) genehmigte DISSERTATION von M.Sc. Harsha Umesh Babu geb. in: Bangalore Tag der mündlichen Prüfung: 10. Dezember 2013 Hauptreferent: Prof. Dr. rer. nat. Wilhelm Stork Korreferent: Prof. Dr. rer. nat. Cornelius Neumann Karlsruhe, den January 20, 2014 To my friends and family. Declaration I hereby declare that I wrote my doctoral dissertation on my own and that I have followed the regulations relating to good scientific practice of the Karlsruhe Institute of Technology (KIT) in its latest form. I have not used any unacknowledged sources or means and I have marked all references I used literally or by content. This work has not previously been presented in an identical or similar form to any other university or examination board. Karlsruhe, 12. November 2013 ——————————— Harsha Umesh Babu i Acknowledgments Although this appears at the beginning of the document, I would like to emphasize that it was written at the very end of this wonderful journey. The simple reason, for why I had put off writing this section is - I do not know how to appropriately express my gratitude to all the people who have helped me reach this stage in life. I do not want to sound obligatory in acknowledging the help and influence while at same time inadvertently forget mentioning names. I would like to express my sincere thanks to Prof. Wilhelm Stork and my master thesis supervisor Prof. K.-D. Müller-Glaser, for giving me the opportunity to pursue graduate studies at Institut für Technik der Informationsverarbeitung (ITIV). The German equivalent of a PhD Supervisor is ’Doktorvater’, and it lit- erally translates into ’Doctoral father’. Prof. Wilhelm Stork or Willy as he is known to everybody, is my ’Doktorvater’. His infectious philosophy towards learning and teaching - Man lernt fürs Leben has been constant source of encouragement over the years. I would like to explicitly thank him for the propitious working relationship, where I had the room for making my own mistakes and learning from them. My thanks to Prof. Cornelius Neumann for agreeing to be the co-referent and encouragement for the successful defence of my dissertation. The impact of colleagues cannot be understated. There have been many a times when work was not bearing fruit but the inspiration to keep going can be solely attributed to it is a joy to work with colleagues. Thanks to all my colleagues at ITIV, for your patience, encouragement and many times, for simply ’putting up’ with cranky me! A special mention to the ITIV-Optics members, for helping me with project reports, technical reviews, checking (and rechecking) my results and brainstorming everything under the sun! A substantial part of the work for my dissertation was done in co-operation with Informium AG, who were our industrial partners. Over the years and many visits to Leverkusen and Bergisch Gladbach, I have come to appreciate the efforts that go into creating a product from a mere technology. I wish acknowledge the help and co-operation that I have received from all the people at Informium. A part of my graduate studies were supported by Karlsruhe School of Optics and Photonics (KSOP). The concept of graduate studies supplemented with management modules and mentor has had a positive influence in my pursuit of PhD. Assistance and advice provided by KSOP is greatly appreciated and ac- knowledged. My parents underwent significant hardships and made sacrifices to their quality of life so as to enable me to receive a good education. This got translated into a me being taught by wonderful teachers throughout my academic life. I wish to thank my parents and all my teachers who have helped me reach this juncture in life. My friends, with whom I have studied, learned, worked, trekked, travelled, engaged in hobbies with, lived with (and currently living with) and shared life, have all endured me and encouraged me to come this far. Thank you all, and I hope I can express my returns in kind. Harsha January 2014 iii Abstract Product security techniques, in particular those targeting counterfeit goods, are under increased focus due to proliferation of supply and distribution chains across the world. Counterfeit goods are not restricted to specific product categories but pose problems across the board. In addition to loss of revenue, the usefulness of the product, functionality and safety are undermined by counterfeit products. A security technique that can be harmoniously applied across product categories as an anti-counterfeiting measure is explored in this dissertation. Physically unclonable functions (PUFs) are physical security mechanisms, which utilize inherent random- ness in processes used to instantiate physical objects. In this dissertation, an extensive overview of both, the state of the art in implementations and the accompanying literature dealing with definition and analysis is provided. Although this is a relatively new domain, one can find established methods and metrics that can be applied in analysis of PUFs. We review these, while presenting our priorities in the framework of anti-counterfeiting application. Focus on experimental verification of unclonability, is a marked difference in our approach when compared with other implementations and analyses in this domain. The concept of the reflective physically unclonable function (r-PUF) is presented as a product security solution. The viability of the concept, while evaluating and defining the requirements of such a system is explored. The evolution process of the system design is elaborated, which allows for understanding of the compromises that were reached. The anti-counterfeiting system is a combination of physical modules –instantiation, registration, verification and software modules –data extraction, algorithms for processing the data and application layers to provide functionality. During the dissertation, end-to-end functionality of an anti-counterfeiting system using r-PUF was verified. The system variables in the r-PUF instantiation process were identified and their influence in the system was studied. Experiments were designed to understand the impact of individual variables and results were analysed. We were able to conclusively prove the unclonability of r-PUFs in an anti-counterfeiting scenario. v Zusammenfassung Methoden zur Produktsicherheit, besonders diejenigen die auf die Unterbindung von Produktfälschungen abzielen werden zunehmend wichtiger, da die Versorgungs- und Verteilungsketten weltweit wachsen. Das Problem der Produktfälschung existiert nicht nur in einigen wenigen Produktkategorien sondern über alle Produktbereiche hinweg. Es gefährdet die unternehmerischen Gewinne, den Produktnutzen und die Sicher- heit für den Anwender. Eine Technik welche einfach für alle Produktgruppen verwendet werden kann um dies zu unterbinden wird im Rahmen dieser Doktorarbeit untersucht. Physically unclonable functions (PUFs) sind physikalische Sicherheitsmechanismen, welche Zufallskomponenten ausnutzen, die prozessin- härent ohnehin auftreten. In Rahmen dieser Dissertation wird ein umfassender Überblick über den Stand der Technik im Bereich der Implementierung und die zugehörigen Definitionen und Analysen gegeben. Obwohl dies ein recht neuer Forschungsbereich ist, gibt es bereits etablierte Methoden und Beurteilungskriterien welche für die PUF Analyse verwendet werden. Diese werden vorgestellt und die relevanten Punkte für das Umfeld der Produktfälschung herausgearbeitet. Der Fokus liegt dabei auf der experimentellen Verifizierung der Nicht- Reproduzierbarkeit, was die vorliegende Arbeit zu anderen Implementierungen und Analysen in diesem Bereich abgrenzt. Das Problem der Produktsicherheit wird dann unter Verwendung einer konkreten Implementierungsop- tion, der reflektierenden PUFs (r-PuFs), gelöst. Dafür wird zuerst die Machbarkeit dieses Konzepts unter- sucht indem die Rahmenbedingungen für ein System festgelegt und Anforderungen abgeleitet werden. Die Systemanforderungen während des Entwicklungsprozesses werden dabei schrittweise beschrieben und die entsprechend resultierenden Designparameter diskutiert. Anschließend wird das Konzept in einen Labo- raufbau umgesetzt. Es besteht dabei aus physikalischen Teilen sowie der zugehörige Software. Ersteres umfasst die Instanziierung, Registrierung und Verifizierung, während letzteres die Datenextraktion, Algo- rithmen zur Datenprozessierung und die Anwendungsschicht umfasst.Innerhalb dieser Arbeit wurde damit die End-to-End Funktionalität eines Systems zur Produktsicherheit unter Verwendung der r-PUFs verifiziert. Die Systemvariablen im r-PUF Instanziierungs-Prozess wurden identifiziert und deren Einfluss auf das System untersucht. Es wurden Experimente geplant und durchgeführt welche den Einfluss der einzelnen Variablen auf die Ergebnisse untersuchen. Außerdem war es möglich die Fälschungssicherheit dieser r- PUFs in tatsächlichen Produktsicherheitsszenarien zu beweisen. vii Contents 1 Introduction ............................................. 1 1.1 Motivation ........................................... 3 1.2 Research objective ...................................... 4 1.3 Layout of the dissertation ................................... 5 2 PUF: Concepts and Denitions .................................. 7 2.1 One way functions ....................................... 7 2.1.1 Algorithmic OWF ..................................
Recommended publications
  • Guidelines for Securing Radio Frequency Identification (RFID) Systems
    Special Publication 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems Recommendations of the National Institute of Standards and Technology Tom Karygiannis Bernard Eydt Greg Barber Lynn Bunn Ted Phillips NIST Special Publication 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems Recommendations of the National Institute of Standards and Technology Tom Karygiannis Bernard Eydt Greg Barber Lynn Bunn Ted Phillips C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 April 2007 US Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director GUIDELINES FOR SECURING RFID SYSTEMS Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. Special Publication 800-series documents report on ITL’s research, guidelines, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-98 Natl.
    [Show full text]
  • Tesi Definitiva
    UNIVERSITA’ DEGLI STUDI DI TORINO FACOLTA’ DI ECONOMIA CORSO DI LAUREA IN ECONOMIA E DIREZIONE DELLE IMPRESE RELAZIONE DI LAUREA INNOVATIVI DISPOSITIVI TECNOLOGICI PER UNA MAGGIORE INFORMAZIONE DEL CONSUMATORE NEL SETTORE AGROALIMENTARE: UNO STUDIO AL SALONE DEL GUSTO 2010 Relatore: Prof. Giovanni Peira Correlatori: Prof. Luigi Bollani Dott. Sergio Arnoldi Candidato: Andrea Gino Sferrazza ANNO ACCADEMICO 2010/2011 Ringraziamenti Ringrazio per la stesura di questo lavoro: - il Prof. Giovanni Peira del Dipartimento di Scienze Merceologiche, per avermi seguito e aiutato durante questo lavoro, fornendomi parte del materiale di studio, indicandomi alcune persone cruciali per la buona riuscita della stesura e per la sua completa disponibilità durante quesi mesi di ricerche; - il Prof. Luigi Bollani, del Dipartimento di Statistica e Matematica applicata “Diego de Castro”, per il suo fondamentale contributo nell’impostazione e nell’elaborazione del questionario, proposto durante il Salone del Gusto 2010; - il Dott. Sergio Arnoldi, coordinatore dell’Area Promozione Agroalimentare della Camera di commercio di Torino, il quale ha messo a disposizione tempo e risorse preziose per questo progetto di ricerca, sempre con molta professionalità e competenza; - il Dott. Alessandro Bonadonna del Dipartimento di Scienze Merceologiche, per avermi fornito preziosi spunti per la trattazione; - tutti coloro che mi hanno supportato nella stesura ed elaborazione del questionario, rendendo possibile il raggiungimento degli obiettivi prefissati nei tempi prestabiliti. Ringraziamenti particolari Il primo ringraziamento va a mia madre, l’unica vera persona che mi ha accompagnato in ogni momento durante il mio percorso di studio. Senza di lei, non avrei potuto raggiungere questo importante traguardo. Questo risultato lo divido con te.
    [Show full text]
  • 3 Security Threats for RFID Systems
    FIDIS Future of Identity in the Information Society Title: “D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)” Author: WP3 Editors: Martin Meints (ICPP) Reviewers: Jozef Vyskoc (VaF) Sandra Steinbrecher (TUD) Identifier: D3.7 Type: [Template] Version: 1.0 Date: Monday, 04 June 2007 Status: [Deliverable] Class: [Public] File: fidis-wp3-del3.7.literature_RFID.doc Summary In this deliverable the physical properties of RFID, types of RFID systems basing on the physical properties and operational aspects of RFID systems are introduced and described. An overview on currently know security threats for RFID systems, countermeasures and related cost aspects is given. This is followed by a brief overview on current areas of application for RFID. To put a light on status quo and trends of development in the private sector in the context of RFID, the results of a study carried out in 2004 and 2005 in Germany are summarised. This is followed by an overview on relevant standards in the context of RFID. This deliverable also includes a bibliography containing relevant literature in the context of RFID. This is published in the bibliographic system at http://www.fidis.net/interactive/rfid-bibliography/ Copyright © 2004-07 by the FIDIS consortium - EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Copyright Notice: This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the FIDIS Consortium.
    [Show full text]
  • ISO Update Marec 2011
    International Standards in process An International Standard is the result of an agreement between the member bodies of ISO. A first important step towards an International Standard takes the form of a committee draft (CD) - this is circulated for study within an ISO technical committee. When consensus has been reached within the technical committee, the document is sent to the Central Secretariat for processing as a draft International Standard (DIS). The DIS requires approval by at least 75 % of the member bodies casting a vote. A confirmation vote is subsequently carried out on a final draft International Standard (FDIS), the approval criteria remaining the same. Standards published New International Standards published between 01 March and 31 March 2011 * Available in English only ** French version of standard previously published in English only Price grou p TC 2 Fasteners ISO 4014:2011 Hexagon head bolts — Product grades A and B G ISO 4016:2011 Hexagon head bolts — Product grade C E ISO 8765:2011 Hexagon head bolts with metric fine pitch thread — Product grades A and B F ISO 14579:2011 Hexalobular socket head cap screws D ISO 14580:2011 Hexalobular socket cheese head screws C ISO 14583:2011 Hexalobular socket pan head screws C ISO 14584:2011 Hexalobular socket raised countersunk head screws C ISO 10510:2011 Tapping screw and washer assemblies with plain washers B TC 4 Rolling bearings ISO 15:2011 Rolling bearings — Radial bearings — Boundary dimensions, general plan K TC 17 Steel ISO 10893-1:2011 Non-destructive testing of steel
    [Show full text]
  • A Hybrid Traceability Technology Selection Approach for Sustainable Food Supply Chains
    sustainability Article A Hybrid Traceability Technology Selection Approach for Sustainable Food Supply Chains Samantha Islam 1,*, Louise Manning 2 and Jonathan M. Cullen 1 1 Energy, Fluids and Turbomachinery Division, Department of Engineering, University of Cambridge, Cambridge CB2 1PZ, UK; [email protected] 2 School of Agriculture, Food and the Environment, Royal Agricultural University, Gloucestershire GL7 6JS, UK; [email protected] * Correspondence: [email protected] Abstract: Traceability technologies have great potential to improve sustainable performance in cold food supply chains by reducing food loss. In existing approaches, traceability technologies are selected either intuitively or through a random approach, that neither considers the trade-off between multiple cost–benefit technology criteria nor systematically translates user requirements for traceability systems into the selection process. This paper presents a hybrid approach combining the fuzzy Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) with integer linear programming to select the optimum traceability technologies for improving sustainable performance in cold food supply chains. The proposed methodology is applied in four case studies utilising data collected from literature and expert interviews. The proposed approach can assist decision-makers, e.g., food business operators and technology companies, to identify what combination of technologies best suits a given food supply chain scenario and reduces food loss at minimum cost. Citation: Islam, S.; Manning, L.; Cullen, J.M. A Hybrid Traceability Keywords: cold food chain; traceability technology; technology selection; fuzzy AHP; fuzzy TOPSIS; Technology Selection Approach for integer linear programming Sustainable Food Supply Chains. Sustainability 2021, 13, 9385.
    [Show full text]
  • Rfid Para La Empresa Soluciones G Cuatro Del Ecuador Cia
    ESCUELA POLITECNICA NACIONAL FACULTAD DE INGENIERÍA ELÉCTRICA Y ELECTRÓNICA DISEÑO DE UN SISTEMA DE CONTROL DE ACCESO UTILIZANDO LA TECNOLOGÍA DE IDENTIFICACIÓN RFID PARA LA EMPRESA SOLUCIONES G CUATRO DEL ECUADOR CIA. LTDA. PROYECTO PREVIO A LA OBTENCIÓN DEL TITULO DE INGENIERO EN ELECTRONICA Y REDES DE INFORMACIÓN PABLO WALTER PUPIALES ANGAMARCA [email protected] DIRECTOR: Ing. NELSON AVILA [email protected] Quito, julio 2009 DECLARACIÓN Yo, Pablo Walter Pupiales Angamarca, declaro bajo juramento que el trabajo aquí descrito es de mi autoría; que no ha sido previamente presentada para ningún grado o calificación profesional; y, que he consultado las referencias bibliográficas que se incluyen en este documento. A través de la presente declaración cedo mis derechos de propiedad intelectual correspondientes a este trabajo, a la Escuela Politécnica Nacional, según lo establecido por la Ley de Propiedad Intelectual, por su Reglamento y por la normatividad institucional vigente. Pablo Pupiales A. CERTIFICACIÓN Certifico que el presente trabajo fue desarrollado por Pablo Walter Pupiales Angamarca, bajo mi supervisión. Ing. Nelson Avila DIRECTOR DE PROYECTO DEDICATORIA A mis adorados padres Teodoro y Rosa quienes incondicionalmente me han apoyado en todo y siempre han estado pendientes de mis éxitos y fracasos de mis alegrías y tristezas a ellos que siempre me han dado el buen ejemplo de superación les dedico con todo mi amor este triunfo tan importante. A ti Consuelo que eres mi hermana y segunda madre y siempre has estado cuidando de mí, te quiero mucho. A mis demás hermanos Alberto, Serafín, Segundo, Edwin quienes han sido para mí un ejemplo de superación y guía.
    [Show full text]
  • TR 187 020 V1.1.1 (2011-05) Technical Report
    ETSI TR 187 020 V1.1.1 (2011-05) Technical Report Radio Frequency Identification (RFID); Coordinated ESO response to Phase 1 of EU Mandate M436 2 ETSI TR 187 020 V1.1.1 (2011-05) Reference DTR/TISPAN-07044 Keywords privacy, RFID, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • Nieuwe Normen NEN
    NEN Nieuwe normen NEN Overzicht van nieuwe publicaties van NEN-EN 1304:2003 Ontw. – lersystemen; Ontwerp, installatie en het Nederlands Normalisatie- Keramische dakpannen en hulpstuk- onderhoud. (en). Prijs € 111,83. Instituut, inclusief de Europese nor- ken; Definities en productspecifica- NEN-EN 13036-4:2003 – Oppervlak- men, in de periode 3 september 2003 ties. (en). Kritiek voor 2003-12-24. eigenschappen voor weg- en vlieg- t/m 7 oktober 2003. De prijzen voor Prijs € 23,85. veldverhardingen; de normen afkomstig van ETSI in de NEN-EN 1337-10:2003 – Opleggingen Beproevingsmethoden; Deel 4: rubriek ’Telecommunicatie’ zijn op voor bouwkundige en civieltechnische Methode voor de meting van de aanvraag beschikbaar. De normbla- toepassingen; Deel 10: Inspectie en stroefheid van een oppervlak; De slin- den kunnen worden besteld bij NEN- onderhoud. (en). Prijs € 40,28. gerproef. (en). Prijs € 50,35. Klantenservice, tel. 015-2690391. NEN-EN 1744-4:2003 2e Ontw. – NEN-EN 13036-7:2003 – Oppervlak- Tevens kunnen de genoemde normen Beproevingen voor chemische eigen- eigenschappen voor weg- en vlieg- via Internet besteld worden schappen van toeslagmaterialen; Deel veldverhardingen; (www.nen.nl). Met vragen kunt u 4: Bepaling van de watergevoeligheid Beproevingsmethoden; Deel 7: terecht bij NEN-Klantenservice, tel. van vulstoffen voor bitumineuze Vlakheidsmeting van een verhardings- 015-2690391. Correspondentieadres: mengsels. (en). Kritiek voor 2003-11- oppervlak met een rei. (en). Prijs postbus 5059, 2600 GB Delft. 21. Prijs € 19,08. € 40,28. NEN-EN 12101-4:2003 2e Ontw. – NEN-EN 13363-1:2003 – Zonwerende Bouw Installaties voor rook- en warmtebe- voorzieningen gecombineerd met heersing; Deel 4: Samenstelling van beglazing; Berekening van zon- en NEN-EN 312:2003 – Spaanplaat; systemen voor rook- en warmtebe- lichtdoorlatendheid; Deel 1: Specificaties.
    [Show full text]
  • Merlin Partner User Guide
    Merlin Partner User Guide Merlin - Version 1.18 Enterprise Europe Network 2 Merlin User Guide - updated 28 April 2015 Table of contents 1. Introduction 9 About Merlin 9 About this guide 9 Accessing Merlin 10 Merlin Logout 10 Browser Optimisation 11 What if I need help? 11 Icon Legend 11 Navigating Merlin 12 Exporting your Content 13 The Dashboards 13 Using the Filters 15 Clear Filters 16 Working with Technology, Market and NACE Keywords 17 When should I use different levels of keywords? 17 How do I select keywords in Merlin? 18 Where can I find a current list of Technology, Market and NACE keywords? 18 Who to Contact 18 Feedback 19 2. Change History 21 New features 21 Changes that impact your work 21 Features under development 21 3. Managing Profiles 23 Profile Workflow Overview 23 Profile creation 24 Internal Review Process 24 External Review Process 24 Blocking Scores 25 Enterprise Europe Network Profile expiry date 25 My Profiles Dashboard 25 Create a new profile 27 Review a profile 29 Edit a Draft profile 32 My Expired Profiles Dashboard 32 Modifying profile deadlines 33 Delete a profile 34 Archive a profile 35 Change your external reviewer status 35 Update your external reviewer information 36 Resign as an external reviewer 37 Reassign Profiles 38 4. Disseminating Profiles 39 Profile Search - Intranet 39 Intranet Simple Search 39 Intranet Advanced Search 40 Profile Search - Internet 43 Export Profiles 43 Export a Single Profile 43 Export All Profiles From Search Results 45 Merlin POD Web Service 45 5. Managing Clients and Queries
    [Show full text]
  • Guidelines for Securing Radio Frequency Identification (RFID) Systems
    Special Publication 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems Recommendations of the National Institute of Standards and Technology Tom Karygiannis Bernard Eydt Greg Barber Lynn Bunn Ted Phillips NIST Special Publication 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems Recommendations of the National Institute of Standards and Technology Tom Karygiannis Bernard Eydt Greg Barber Lynn Bunn Ted Phillips C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 April 2007 US Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director GUIDELINES FOR SECURING RFID SYSTEMS Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. Special Publication 800-series documents report on ITL’s research, guidelines, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-98 Natl.
    [Show full text]
  • Tesis T1375ec.Pdf
    DEDICATORIA Dedico este trabajo, a mi pilar fundamental de vida, mi Madre, quien me inculco valores y me demostró que esta vida se debe luchar y disfrutar día a día, permitiéndome ser cada vez una mejor persona. A mi Padre, Que con su recuerdo me animado a seguir a lo largo de este camino. A mis hermanas, quienes me han animado y apoyado a continuar con mis sueños, brindándome un apoyo incondicional sacándome sonrisas en los momentos más difíciles de mi vida. Víctor David Vasco Cabrera vi AGRADECIMIENTO Agradezco a mi Padre Supremo, por bendecirme con fortaleza para continuar con el aprendizaje de la vida. A mi Madre, por apoyarme en toda mi carrera estudiantil, y demostrarme que no importa los problemas que se tenga, lo importante es el aprendizaje que estos dejan al solucionarlos, por el ejemplo de constante lucha y superación. A mis hermanas, por darme fuerzas ánimo y ejemplo para terminar y luchar por las metas propuestas. Víctor David Vasco Cabrera vii ÍNDICE UNIVERSIDAD TÉCNICA DE AMBATO ................................................................. i APROBACIÓN DEL TUTOR ..................................................................................... ii AUTORÍA ................................................................................................................... iii DERECHOS DE AUTOR ........................................................................................... iv APROBACIÓN DE LA COMISIÓN CALIFICADORA ............................................ v DEDICATORIA .........................................................................................................
    [Show full text]
  • SITAC Consortium
    State of the Art and Related Technologies ITEA2 11020 Project VERSION 1.0 Editors Antonio M. Ortiz (Institut Mines-Telecom) Alcatel, Arcelik, KoçSistem, Gemalto, GS Contributors Technologies, Institut Mines-Telecom, Instituto de Telecomunicaçöes, MobiquiThings, Prodevelop, Planet Media, Sen.se, Soft4Energy, Starhome, Thales, University of Alcala, University of Seville, UPV-PROS, University Paris- Est Marne-la-Valée Date 15 January, 2014 Status Version 1.0 Confidentiality Public COPYRIGHT Copyright 2014 The SITAC Consortium. The information contained in this report is subject to change without notice and should not be construed as a commitment by any members of the SITAC Consortium. In the event of any software or algorithms being described in this report, the SITAC Consortium assumes no responsibility for the use or inability to use any of its software or algorithms. The information is provided without any warranty of any kind and the SITAC Consortium expressly disclaims all implied warranties, included but not limited to the implied warranties of merchantability and fitness for a particular use. This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the SITAC Consortium. In addition to such written permission to copy, reproduce or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. All rights reserved. 2 DOCUMENT HISTORY Version Date Editor Comments 0.1 Draft 1 June, 2013 Antonio M. Ortiz Initialization for partner contributions 0.1 Draft 2 June, 2013 Prodevelop Data storage & aggregation 0.1 Draft 3 June, 2013 UAH Data management 0.1 Draft 4 June, 2013 Prodevelop Review Data management section 0.1 Draft 5 July, 2013 Alcatel-Lucent Introduction to Data Management.
    [Show full text]