Formal verification of cryptographic protocol for secure RFID system

Hyun Seok Kim, Jung Hyun Oh, Ju Bae Kim, Yeon Oh Jeong, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

RFID technology has become one of the most hotly debated ubiquitous computing technologies, and public fears of its alleged capability for comprehensive surveillance have prompted a flurry of research trying to alleviate such concerns. Security mechanisms for RFID systems are therefore of utmost important. In this paper, we describe problems of previous work on RFlD security protocols and specify several known attacks with Casper (A Compiler of Security Protocol Analyzer), then verify their security properties such as secrecy and authentication using the FDR (Failure Divergence Refinement) model checking tool. Finally, we discuss practical issue of the hash authentication RFID security protocol, which guarantee data privacy and authentication between a tag and a reader using Casper and FDR.

Original languageEnglish
Title of host publicationProceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008
Pages470-477
Number of pages8
DOIs
Publication statusPublished - 2008
Event4th International Conference on Networked Computing and Advanced Information Management, NCM 2008 - Gyeongju, Korea, Republic of
Duration: 2008 Sep 22008 Sep 4

Publication series

NameProceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008
Volume2

Other

Other4th International Conference on Networked Computing and Advanced Information Management, NCM 2008
CountryKorea, Republic of
CityGyeongju
Period08/9/208/9/4

Keywords

  • Authentication
  • Model checking
  • Privacy
  • RFID

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Formal verification of cryptographic protocol for secure RFID system'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O., & Choi, J. Y. (2008). Formal verification of cryptographic protocol for secure RFID system. In Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008 (pp. 470-477). [4624188] (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; Vol. 2). https://doi.org/10.1109/NCM.2008.21