RFID privacy protection scheme for secure ubiquitous computing

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007
Pages117-124
Number of pages8
Publication statusPublished - 2007
Event1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007 - Funchal, Madeira, Portugal
Duration: 2007 Jun 122007 Jun 12

Publication series

NameProceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007

Other

Other1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007
CountryPortugal
CityFunchal, Madeira
Period07/6/1207/6/12

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Communication

Fingerprint Dive into the research topics of 'RFID privacy protection scheme for secure ubiquitous computing'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Oh, J. H., & Choi, J. Y. (2007). RFID privacy protection scheme for secure ubiquitous computing. In Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007 (pp. 117-124). (Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007).