Académique Documents
Professionnel Documents
Culture Documents
www.ITI.TUGraz.at
Manuel Menghin
2013-02-05
1
Outline
www.ITI.TUGraz.at
Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook
Manuel Menghin
2013-02-05
2
Smart Card
Challenges
Cost Pressure
Security Requirements
RF Interface
IF Security
Field Strength Scaling
Reader
Power Shortage
System Complexity
Mobility
Software
META[:SEC:]
Chip
RF Interface
Line-powered
Battery-powered
META[:SEC:] : Mobile Energy-efficient Trustworthy Authentication Systems with Elliptic Curve based SECurity, funded by the Austrian
Federal Ministry for Transport, Innovation, and Technology under the FIT-IT contract FFG 829586. The META[:SEC:] consortium consists
of TU-Graz, Infineon Technologies Austria AG and Enso Detego GmbH.
Manuel Menghin
2013-02-05
3
Battery
CPU
Crypto Core
RF-Interface
(HF-RFID)
Reader-IC
(HF-RFID)
RFID communication
(data transfer and
power transfer)
CPU or
Statemachine
Crypto Core
Use case
Reading digital business cards (reading data >1k)
Manuel Menghin
2013-02-05
4
Manuel Menghin
2013-02-05
5
Common countermeasures
Component based power optimization (power efficient chips)
Crypto Cores in hardware
Peripherals
MEM
ARM
Battery
Crypto
Manuel Menghin
Mobile
Reader
Reader
IC
Smart Card/
RFID Tag
SC Chip
Power optimizations
Fault analyses
Power aware security analyses
2013-02-05
6
H-Field [H]
Adapted H-Field
Required H-Field
idle
executing
idle
Time [s]
Manuel Menghin
2013-02-05
7
Manuel Menghin
2013-02-05
8
Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook
Manuel Menghin
2013-02-05
9
Related work
[Benini2000]
Manuel Menghin
2013-02-05
10
Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook
Manuel Menghin
2013-02-05
11
www.ITI.TUGraz.at
Approach
Observer-Controller power-managment technique [Benini2000]
Observe
The physical relation factor
The current power consumption of the transponder
Control
The magnetic field strength
NFC-DynFS
Time
Smart
Phone
Pin
uses
Time
uses
Power
Consumption
Physical Relation
Factor
Field Strength
controls
Transponder
(Tag)
Coil
Coil
Time
Power
Supply
Pout
Manuel Menghin
2013-02-05
12
www.ITI.TUGraz.at
Transmission
current
Acquire thresholds
for possible field
strength gains
Manuel Menghin
2013-02-05
13
www.ITI.TUGraz.at
Transponder
Reader
Near Field
Communication
SendAPDU
ScaleMagneticFieldStrength
NFC-DynFS
FieldStrengthScaler
PowerPredictionUnit
+Event: Operation invoked
PhysicalRelationSensingUnit
Manuel Menghin
2013-02-05
14
Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook
Manuel Menghin
2013-02-05
15
Manuel Menghin
2013-02-05
16
www.ITI.TUGraz.at
Case Study
Used for the simulation and measurement
Use case of reading a digital business card
Detect Card
[card detected]
Read Business
Card (1 kB)
/wait 100 ms
Idle
/deactivate H-Field
/wait 100 ms
/numberOfRetries -uses
Three implementations:
NFC-DynFS
Close Connection
/deactivate H-Field
/wait 100 ms
Manuel Menghin
2013-02-05
17
Simulation
Needed energy of the system [Norm.]
No field strength scaling
1.00
With simple field strength scaling
0,87
With NFC-DynFS
0.77
Manuel Menghin
2013-02-05
18
Measurement
Needed energy of the system [Norm.]
No field strength scaling
0.98
With simple field strength scaling
1.00
With NFC-DynFS
0.73
Manuel Menghin
2013-02-05
19
Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook
Manuel Menghin
2013-02-05
20
Conclusion / Outlook
Conclusion
NFC-DynFS improofs simple field strength scaling from [MenM2012]
Adaption to changing physical relation factor
26% lesser energy consumption in case study
NFC-DynFS avoids undersupply of the transponder
Adapts to the physical relation factor
Adapts to the current power consumption
Outlook
Field strength scaling for multiple transponders
Solve the issue to faster respond to physical relation factor changes
NFC-DynFS without needing threshold values of the system
Manuel Menghin
2013-02-05
21
Bibliography
[MenM2012] Menghin, M.; Druml, N.; Steger, C.; Wei, R.; Haid, J.; Holger, B. : The PTF-Determinator: A run-time method used to save energy in
NFC-Systems - in: 4th international EURASIP workshop on RFID technology. (2012), S. 92 98
[Benini2000] Luca Benini and Giovanni de Micheli. 2000. System-level power optimization: techniques and tools. ACM Trans. Des. Autom. Electron.
Syst. 5, 2 (April 2000)
[Xu2011] Xunteng Xu; Lin Gu; Jianping Wang; Guoliang Xing; Shing-Chi Cheung; , "Read More with Less: An Adaptive Approach to Energy-Efficient
RFID Systems," Selected Areas in Communications, IEEE Journal on , vol.29, no.8, pp.1684-1697, September 2011
[Clulow2006] Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. 2006. So near and yet so far: distance-bounding attacks in
wireless networks. In Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS'06)
[1] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. New York, NY, USA: John
Wiley & Sons, Inc., 2003.
[2] M. Roland, H. Witschnig, E. Merlin, and C. Saminger, Automatic impedance matching for 13.56 mhz nfc antennas, in Communication Systems,
Networks and Digital Signal Processing, 2008. CNSDSP 2008. 6th International Symposium on, july 2008, pp. 288 291.
[3] D. Cheng, Z. Wang, and Q. Zhou, Analysis of distance of rfid systems working under 13.56mhz, in Wireless Communications, Networking and
Mobile Computing, 2008. WiCOM 08. 4th International Conference on, oct. 2008, pp. 1 3.
[4] E. Rolf and V. Nilsson, Near Field Communication (NFC) for Mobile Phones, in Near Field Communication (NFC) for Mobile Phones, 2006, p. 25.
[5] E. Strommer, M. Jurvansuu, T. Tuikka, A. Ylisaukko-oja, H. Rapakko, and J. Vesterinen, Nfc-enabled wireless charging, in Near Field
communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36 41.
[6] C. Moser, L. Thiele, D. Brunelli, and L. Benini, Adaptive power management for environmentally powered systems, Computers, IEEE
Transactions on, vol. 59, no. 4, pp. 478 491, april 2010.
[7] C. Bachmann, A. Genser, C. Steger, R. Weiss, and J. Haid, Automated power characterization for run-time power emulation of soc designs, in
Digital System Design: Architectures, Methods and Tools (DSD), 2010 13th Euromicro Conference on, sept. 2010, pp. 587 594.
[8] T. Lohmann, M. Schneider, and C. Ruland, Analysis of power constraints for cryptographic algorithms in mid-cost rfid tags, in Smart Card
Research and Advanced Applications, ser. Lecture Notes in Computer Science, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Springer
Berlin / Heidelberg, 2006, vol. 3928, pp. 278288, 10.1007/1173344720.
[9] O. Unsal and I. Koren, System-level power-aware design techniques in real-time systems, Proceedings of the IEEE, vol. 91, no. 7, pp. 1055
1069, july 2003.
[10] S. Chatterjee, S. Roy, and S. Bandyopadhyay, Hop-efficient and poweroptimized routing strategy in a decentralized mesh network using
directional antenna, in Parallel and Distributed Computing, 2006. ISPDC 06. The Fifth International Symposium on, july 2006, pp. 155 160.
Manuel Menghin
2013-02-05
22
Manuel Menghin
2013-02-05
23