A lightweight protocol analysis and modification for secure RFID system

Hyun Seok Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A Radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important. In this paper, the RFID security protocols (HB ++[first] and HB++[second]) presented in Bringer et al. are shown to be vulnerable to active attacks and a modified solution is presented. Some of the security violations that may occur and possible remedies that were provided in the literature are discussed. Finally, the modifications to HB++, a recent variant of HB is proposed.

Original languageEnglish
Title of host publicationProceedings - International Conference on Computer Communications and Networks, ICCCN
Pages958-962
Number of pages5
DOIs
Publication statusPublished - 2008 Dec 26
Event17th International Conference on Computer Communications and Networks, ICCCN 2008 - St. Thomas, Virgin Islands, U.S.
Duration: 2008 Aug 32008 Aug 7

Other

Other17th International Conference on Computer Communications and Networks, ICCCN 2008
CountryVirgin Islands, U.S.
CitySt. Thomas
Period08/8/308/8/7

Keywords

  • Lightweight protocol
  • RFID
  • Security protocol

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'A lightweight protocol analysis and modification for secure RFID system'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., & Choi, J. Y. (2008). A lightweight protocol analysis and modification for secure RFID system. In Proceedings - International Conference on Computer Communications and Networks, ICCCN (pp. 958-962). [4674336] https://doi.org/10.1109/ICCCN.2008.ECP.177