Abstract
Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
Original language | English |
---|---|
Title of host publication | Proceedings - International Computer Software and Applications Conference |
Pages | 195-202 |
Number of pages | 8 |
Volume | 2 |
DOIs | |
Publication status | Published - 2006 Dec 1 |
Event | 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Chicago, IL, United States Duration: 2006 Sep 17 → 2006 Sep 21 |
Other
Other | 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 |
---|---|
Country | United States |
City | Chicago, IL |
Period | 06/9/17 → 06/9/21 |
Fingerprint
Keywords
- Casper
- CSP
- FOR
- Model Checking
- RFID Security
ASJC Scopus subject areas
- Software
Cite this
Security analysis of RFID authentication for pervasive systems using model checking. / Kim, Hyun Seok; Oh, Jeong Hyun; Choi, Jin Young.
Proceedings - International Computer Software and Applications Conference. Vol. 2 2006. p. 195-202 4020167.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Security analysis of RFID authentication for pervasive systems using model checking
AU - Kim, Hyun Seok
AU - Oh, Jeong Hyun
AU - Choi, Jin Young
PY - 2006/12/1
Y1 - 2006/12/1
N2 - Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
AB - Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
KW - Casper
KW - CSP
KW - FOR
KW - Model Checking
KW - RFID Security
UR - http://www.scopus.com/inward/record.url?scp=34247499953&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34247499953&partnerID=8YFLogxK
U2 - 10.1109/COMPSAC.2006.158
DO - 10.1109/COMPSAC.2006.158
M3 - Conference contribution
AN - SCOPUS:34247499953
SN - 0769526551
SN - 9780769526553
VL - 2
SP - 195
EP - 202
BT - Proceedings - International Computer Software and Applications Conference
ER -