Security analysis of RFID authentication for pervasive systems using model checking

Hyun Seok Kim, Jeong Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Title of host publicationProceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium
Pages195-202
Number of pages8
DOIs
Publication statusPublished - 2006 Dec 1
Event30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Chicago, IL, United States
Duration: 2006 Sep 172006 Sep 21

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume2
ISSN (Print)0730-3157

Other

Other30th Annual International Computer Software and Applications Conference, COMPSAC 2006
CountryUnited States
CityChicago, IL
Period06/9/1706/9/21

Keywords

  • CSP
  • Casper
  • FOR
  • Model Checking
  • RFID Security

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Security analysis of RFID authentication for pervasive systems using model checking'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Oh, J. H., & Choi, J. Y. (2006). Security analysis of RFID authentication for pervasive systems using model checking. In Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium (pp. 195-202). [4020167] (Proceedings - International Computer Software and Applications Conference; Vol. 2). https://doi.org/10.1109/COMPSAC.2006.158