RFID privacy protection scheme for secure ubiquitous computing

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007
Pages117-124
Number of pages8
Publication statusPublished - 2007 Dec 1
Event1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007 - Funchal, Madeira, Portugal
Duration: 2007 Jun 122007 Jun 12

Other

Other1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007
CountryPortugal
CityFunchal, Madeira
Period07/6/1207/6/12

Fingerprint

Ubiquitous computing
Radio frequency identification (RFID)
privacy
radio
Network protocols
Authentication
Bar codes
Radio communication
Model checking
Cryptography
secrecy
divergence
Antennas
communication
methodology
ability
management

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Communication

Cite this

Kim, H. S., Oh, J. H., & Choi, J. Y. (2007). RFID privacy protection scheme for secure ubiquitous computing. In Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007 (pp. 117-124)

RFID privacy protection scheme for secure ubiquitous computing. / Kim, Hyun Seok; Oh, Jung Hyun; Choi, Jin Young.

Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. 2007. p. 117-124.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS, Oh, JH & Choi, JY 2007, RFID privacy protection scheme for secure ubiquitous computing. in Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. pp. 117-124, 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007, Funchal, Madeira, Portugal, 07/6/12.
Kim HS, Oh JH, Choi JY. RFID privacy protection scheme for secure ubiquitous computing. In Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. 2007. p. 117-124
Kim, Hyun Seok ; Oh, Jung Hyun ; Choi, Jin Young. / RFID privacy protection scheme for secure ubiquitous computing. Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. 2007. pp. 117-124
@inproceedings{88f8ac4499a2456d8988019adefc36c3,
title = "RFID privacy protection scheme for secure ubiquitous computing",
abstract = "A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.",
author = "Kim, {Hyun Seok} and Oh, {Jung Hyun} and Choi, {Jin Young}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9789898111012",
pages = "117--124",
booktitle = "Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007",

}

TY - GEN

T1 - RFID privacy protection scheme for secure ubiquitous computing

AU - Kim, Hyun Seok

AU - Oh, Jung Hyun

AU - Choi, Jin Young

PY - 2007/12/1

Y1 - 2007/12/1

N2 - A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

AB - A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

UR - http://www.scopus.com/inward/record.url?scp=58149113178&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58149113178&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9789898111012

SP - 117

EP - 124

BT - Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007

ER -