Analysis of the RFID security protocol for secure smart home network

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages356-363
Number of pages8
Volume2
DOIs
Publication statusPublished - 2006 Dec 1
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

Keywords

  • Casper
  • CSP
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Media Technology

Fingerprint Dive into the research topics of 'Analysis of the RFID security protocol for secure smart home network'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Oh, J. H., & Choi, J. Y. (2006). Analysis of the RFID security protocol for secure smart home network. In Proceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006 (Vol. 2, pp. 356-363). [4021239] https://doi.org/10.1109/ICHIT.2006.253634