Security and privacy analysis of RFID authentication protocol for ubiquitous computing

Hyun Seok Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings - International Conference on Computer Communications and Networks, ICCCN
Pages1359-1363
Number of pages5
DOIs
Publication statusPublished - 2007 Dec 1
Event16th International Conference on Computer Communications and Networks 2007, ICCCN 2007 - Honolulu, HI, United States
Duration: 2007 Aug 132007 Aug 16

Other

Other16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
CountryUnited States
CityHonolulu, HI,
Period07/8/1307/8/16

Fingerprint

Ubiquitous computing
Radio frequency identification (RFID)
Authentication
Network protocols
Mobile computing
Model checking
Cryptography
Productivity

Keywords

  • Authentication protocol
  • Capser
  • FDR
  • Model checking
  • RFID

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Kim, H. S., & Choi, J. Y. (2007). Security and privacy analysis of RFID authentication protocol for ubiquitous computing. In Proceedings - International Conference on Computer Communications and Networks, ICCCN (pp. 1359-1363). [4318010] https://doi.org/10.1109/ICCCN.2007.4318010

Security and privacy analysis of RFID authentication protocol for ubiquitous computing. / Kim, Hyun Seok; Choi, Jin Young.

Proceedings - International Conference on Computer Communications and Networks, ICCCN. 2007. p. 1359-1363 4318010.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS & Choi, JY 2007, Security and privacy analysis of RFID authentication protocol for ubiquitous computing. in Proceedings - International Conference on Computer Communications and Networks, ICCCN., 4318010, pp. 1359-1363, 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007, Honolulu, HI, United States, 07/8/13. https://doi.org/10.1109/ICCCN.2007.4318010
Kim HS, Choi JY. Security and privacy analysis of RFID authentication protocol for ubiquitous computing. In Proceedings - International Conference on Computer Communications and Networks, ICCCN. 2007. p. 1359-1363. 4318010 https://doi.org/10.1109/ICCCN.2007.4318010
Kim, Hyun Seok ; Choi, Jin Young. / Security and privacy analysis of RFID authentication protocol for ubiquitous computing. Proceedings - International Conference on Computer Communications and Networks, ICCCN. 2007. pp. 1359-1363
@inproceedings{7d68415467794f85b10a3cc442a7e311,
title = "Security and privacy analysis of RFID authentication protocol for ubiquitous computing",
abstract = "Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.",
keywords = "Authentication protocol, Capser, FDR, Model checking, RFID",
author = "Kim, {Hyun Seok} and Choi, {Jin Young}",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/ICCCN.2007.4318010",
language = "English",
isbn = "9781424412518",
pages = "1359--1363",
booktitle = "Proceedings - International Conference on Computer Communications and Networks, ICCCN",

}

TY - GEN

T1 - Security and privacy analysis of RFID authentication protocol for ubiquitous computing

AU - Kim, Hyun Seok

AU - Choi, Jin Young

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

AB - Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

KW - Authentication protocol

KW - Capser

KW - FDR

KW - Model checking

KW - RFID

UR - http://www.scopus.com/inward/record.url?scp=40949154865&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=40949154865&partnerID=8YFLogxK

U2 - 10.1109/ICCCN.2007.4318010

DO - 10.1109/ICCCN.2007.4318010

M3 - Conference contribution

AN - SCOPUS:40949154865

SN - 9781424412518

SP - 1359

EP - 1363

BT - Proceedings - International Conference on Computer Communications and Networks, ICCCN

ER -