Information Security |
Homework: 1 2 3 4 5 6 7 |
Your report should take the form of a Web page, or a set of linked pages. You should submit a zip-file which unzips into a single directory. The "home page" or "main page" of your report should be named "index.html".
You must work in a group on this assignment.
You may not collaborate with anybody outside your group.
Your task in this assignment is to write a report describing your proposed design, and discussing how well your design meets the requirements set out below. You will be graded partly on your design, and partly on your analysis and critique of your own design.
Sometimes a driver is charged a fixed fee to pass through a given tollbooth. Sometimes (as on the New Jersey Turnpike) the system notes where a driver entered a toll road (by reading the tag at an entrance tollbooth) and where the driver left the toll road (by reading the tag at an exit tollbooth), and computes the toll according to the distance driven.
Some transponder systems use a simple protocol in which the tollbooth emits a fixed "beacon" signal, and whenever the tag hears a beacon, it responds by broadcasting its unique tag-ID number. This design is simple and inexpensive to implement.
Unfortunately, this design poses privacy risks, because it allows anybody to read the tag-IDs of cars that pass them. Anybody can build a listening post that emits the beacon and reads the tag-IDs that are sent back in response, thereby gathering information about who drives past the listening post at which times. A would-be snooper would have to build a database matching tag-IDs to individual people or cars, but that information could be gathered once and re-used.
Some listening posts have been used for legitimate purposes. For example, engineers built a system that reads tags at various places in the freeway system in Houston, Texas. By observing when the same tag passes two points in the system, they can determine the average speed between those two points. This allows them to determine, in real time, the speed of traffic on various segments of freeway. Drivers can get this information on a website.
Your system must allow TollCorp, which operates readers in tollbooths, to charge individual tag-owners tolls. The system must handle both styles of tolls: those that charge a fixed fee for passing through a single tollbooth, and those that use separate entrance and exit tollbooths and charge based on distance driven.
The system must also allow independent traffic monitors -- but only those approved by TollCorp -- to build readers that let them compute the travel time for individual cars between various points on a highway system. But, to the extent possible, it must not allow those monitors to tie the data they collect to any individual tag, car, or owner.
The system should also minimize the amount of information that other people (i.e., people other than TollCorp and the authorized traffic monitors) can learn, even if they build their own reader devices.
Of course, we would like the design to be simple and cheap to build.
When the requirements say that you should do something "to the extent possible", be sure to say precisely what your design manages to achieve in that area.
Your report should be very precise about what the protocol is for communication between the reader and the tag, and about how any cryptographic keys are generated, stored, and used.
Don't forget to say something about the cost of implementing your proposal.
Look at the complexity of computations, and the amount of storage required,
in the reader and the tag. Remember that the goal is to reduce the cost of
the entire system as operated by TollCorp. You don't need to give a dollar
cost estimate for the system or its parts, but you should justify your design
by explaining what you get in exchange for the resources your design uses.
Copyright 2004, Edward W. Felten.