Security analysis of RFID authentication for pervasive systems using model checking

Hyun Seok Kim, Jeong Hyun Oh, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Title of host publicationProceedings - International Computer Software and Applications Conference
Pages195-202
Number of pages8
Volume2
DOIs
Publication statusPublished - 2006 Dec 1
Event30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Chicago, IL, United States
Duration: 2006 Sep 172006 Sep 21

Other

Other30th Annual International Computer Software and Applications Conference, COMPSAC 2006
CountryUnited States
CityChicago, IL
Period06/9/1706/9/21

Fingerprint

Model checking
Radio frequency identification (RFID)
Authentication
Network protocols
Data privacy

Keywords

  • Casper
  • CSP
  • FOR
  • Model Checking
  • RFID Security

ASJC Scopus subject areas

  • Software

Cite this

Kim, H. S., Oh, J. H., & Choi, J. Y. (2006). Security analysis of RFID authentication for pervasive systems using model checking. In Proceedings - International Computer Software and Applications Conference (Vol. 2, pp. 195-202). [4020167] https://doi.org/10.1109/COMPSAC.2006.158

Security analysis of RFID authentication for pervasive systems using model checking. / Kim, Hyun Seok; Oh, Jeong Hyun; Choi, Jin Young.

Proceedings - International Computer Software and Applications Conference. Vol. 2 2006. p. 195-202 4020167.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS, Oh, JH & Choi, JY 2006, Security analysis of RFID authentication for pervasive systems using model checking. in Proceedings - International Computer Software and Applications Conference. vol. 2, 4020167, pp. 195-202, 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, IL, United States, 06/9/17. https://doi.org/10.1109/COMPSAC.2006.158
Kim HS, Oh JH, Choi JY. Security analysis of RFID authentication for pervasive systems using model checking. In Proceedings - International Computer Software and Applications Conference. Vol. 2. 2006. p. 195-202. 4020167 https://doi.org/10.1109/COMPSAC.2006.158
Kim, Hyun Seok ; Oh, Jeong Hyun ; Choi, Jin Young. / Security analysis of RFID authentication for pervasive systems using model checking. Proceedings - International Computer Software and Applications Conference. Vol. 2 2006. pp. 195-202
@inproceedings{6b853131224b4da6bc5c1ca835159a17,
title = "Security analysis of RFID authentication for pervasive systems using model checking",
abstract = "Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.",
keywords = "Casper, CSP, FOR, Model Checking, RFID Security",
author = "Kim, {Hyun Seok} and Oh, {Jeong Hyun} and Choi, {Jin Young}",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/COMPSAC.2006.158",
language = "English",
isbn = "0769526551",
volume = "2",
pages = "195--202",
booktitle = "Proceedings - International Computer Software and Applications Conference",

}

TY - GEN

T1 - Security analysis of RFID authentication for pervasive systems using model checking

AU - Kim, Hyun Seok

AU - Oh, Jeong Hyun

AU - Choi, Jin Young

PY - 2006/12/1

Y1 - 2006/12/1

N2 - Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

AB - Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

KW - Casper

KW - CSP

KW - FOR

KW - Model Checking

KW - RFID Security

UR - http://www.scopus.com/inward/record.url?scp=34247499953&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34247499953&partnerID=8YFLogxK

U2 - 10.1109/COMPSAC.2006.158

DO - 10.1109/COMPSAC.2006.158

M3 - Conference contribution

AN - SCOPUS:34247499953

SN - 0769526551

SN - 9780769526553

VL - 2

SP - 195

EP - 202

BT - Proceedings - International Computer Software and Applications Conference

ER -