CCCP: Secure remote storage for computational RFIDs

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=f1UoxRtVUC0



Duration: 25:52
113 views
0


Passive RFID tags harvest their operating energy from an interrogating reader, but constant energy shortfalls severely limit their computational and storage capabilities. We propose Cryptographic Computational Continuation Passing (CCCP), a mechanism that amplifies programmable passive RFID tagsΓÇÖ capabilities by exploiting an often overlooked, plentiful resource: low-power radio communication. While radio communication is more energy intensive than flash memory writes in many embedded devices, we show that the reverse is true for passive RFID tags. A tag can use CCCP to checkpoint its computational state to an untrusted reader using less energy than an equivalent flash write, thereby allowing it to devote a greater share of its energy to computation. Security is the major challenge in such remote checkpointing. Using scant and fleeting energy, a tag must enforce confidentiality, authenticity, integrity, and data freshness while communicating with potentially untrustworthy infrastructure. Our contribution synthesizes well known cryptographic and low-power techniques with a novel flash memory storage strategy, resulting in a secure remote storage facility for an emerging class of devices. Our evaluation of CCCP consists of energy measurements of a prototype implementation on the batteryless, MSP430-based WISP platform. Our experiments show thatΓÇödespite cryptographic overheadΓÇö remote checkpointing consumes less energy than checkpointing to flash for data sizes above roughly 64 bytes. CCCP enables secure and flexible remote storage that would otherwise outstrip batteryless RFID tagsΓÇÖ resources. This work will appear at USENIX Security 2009. Paper: http://www.cs.umass.edu/~negin/files/salajegheh-CCCP-usenix09.pdf




Other Videos By Microsoft Research


2016-09-07From biology to robots: the RobotCub project
2016-09-07SANDstorm, Elliptic Curves, and a Bit of Fun
2016-09-0760 GHz Single-Chip CMOS Digital Radios and Phased Array Solutions for Gaming and Connectivity
2016-09-07Research on Cognitive Radio Networks at Real-Time Computing Laboratory
2016-09-07Message-Passing for Graph-Structured Linear Programs: Proximal Methods and Rounding Schemes [1/122]
2016-09-07A Spoken Language Interpretation Component for a Robot Dialogue System
2016-09-07Rules of Thumb: 52 Principles for Winning at Business Without Losing Your Self
2016-09-07Virtual Goods, Real Pleasure: Game Mechanics and Virtual Economies
2016-09-07Investigation of Complex Social Systems from Communication Data: Scaling from 10^2 to 10^8
2016-09-07Fine-grained Non-intrusive Sensing of Resource Usage in Buildings
2016-09-07CCCP: Secure remote storage for computational RFIDs
2016-09-07Rethinking Internet Traffic Management Using Optimization Theory
2016-09-07Utility Maximization based P2P Multi-party Video Conferencing
2016-09-07Deep Economy: The Wealth of Communities and the Durable Future [1/2]
2016-09-0715 Years of Research in Technology for the Classroom
2016-09-07Overview of Tree-to-String Translation Models
2016-09-07Advances in P2P Live Video Streaming
2016-09-07BUFFALO: Bloom Filter Forwarding Architecture | Accountability in Hosted Virtual Networks
2016-09-07Safety of Program Transformations in Shared-memory Concurrency
2016-09-07Developing Annotated Korean Learner Corpus and Automatic Analysis of Learner Language
2016-09-07Algorithmic Analysis of Infinite-State Concurrent Systems



Tags:
microsoft research