Analysis of the RFID security protocol for secure smart home network

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages356-363
Number of pages8
Volume2
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

Fingerprint

Home networks
Radio frequency identification (RFID)
Network protocols
Authentication
Data privacy
Model checking
Supply chains
Labels

Keywords

  • Casper
  • CSP
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Media Technology

Cite this

Kim, H. S., Oh, J. H., & Choi, J. Y. (2006). Analysis of the RFID security protocol for secure smart home network. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006 (Vol. 2, pp. 356-363). [4021239] https://doi.org/10.1109/ICHIT.2006.253634

Analysis of the RFID security protocol for secure smart home network. / Kim, Hyun Seok; Oh, Jung Hyun; Choi, Jin Young.

Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 2 2006. p. 356-363 4021239.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS, Oh, JH & Choi, JY 2006, Analysis of the RFID security protocol for secure smart home network. in Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. vol. 2, 4021239, pp. 356-363, 2006 International Conference on Hybrid Information Technology, ICHIT 2006, Cheju Island, Korea, Republic of, 06/11/9. https://doi.org/10.1109/ICHIT.2006.253634
Kim HS, Oh JH, Choi JY. Analysis of the RFID security protocol for secure smart home network. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 2. 2006. p. 356-363. 4021239 https://doi.org/10.1109/ICHIT.2006.253634
Kim, Hyun Seok ; Oh, Jung Hyun ; Choi, Jin Young. / Analysis of the RFID security protocol for secure smart home network. Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006. Vol. 2 2006. pp. 356-363
@inproceedings{af159149f50d431a9c02833973000ea6,
title = "Analysis of the RFID security protocol for secure smart home network",
abstract = "RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.",
keywords = "Casper, CSP, FDR, Model checking, RFID security",
author = "Kim, {Hyun Seok} and Oh, {Jung Hyun} and Choi, {Jin Young}",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/ICHIT.2006.253634",
language = "English",
volume = "2",
pages = "356--363",
booktitle = "Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006",

}

TY - GEN

T1 - Analysis of the RFID security protocol for secure smart home network

AU - Kim, Hyun Seok

AU - Oh, Jung Hyun

AU - Choi, Jin Young

PY - 2006/12/1

Y1 - 2006/12/1

N2 - RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

AB - RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

KW - Casper

KW - CSP

KW - FDR

KW - Model checking

KW - RFID security

UR - http://www.scopus.com/inward/record.url?scp=34247264950&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34247264950&partnerID=8YFLogxK

U2 - 10.1109/ICHIT.2006.253634

DO - 10.1109/ICHIT.2006.253634

M3 - Conference contribution

AN - SCOPUS:34247264950

VL - 2

SP - 356

EP - 363

BT - Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006

ER -