Security and privacy analysis of RFID authentication protocol for ubiquitous computing

Hyun Seok Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
Pages1359-1363
Number of pages5
DOIs
Publication statusPublished - 2007
Event16th International Conference on Computer Communications and Networks 2007, ICCCN 2007 - Honolulu, HI, United States
Duration: 2007 Aug 132007 Aug 16

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Other

Other16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
CountryUnited States
CityHonolulu, HI,
Period07/8/1307/8/16

Keywords

  • Authentication protocol
  • Capser
  • FDR
  • Model checking
  • RFID

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security and privacy analysis of RFID authentication protocol for ubiquitous computing'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., & Choi, J. Y. (2007). Security and privacy analysis of RFID authentication protocol for ubiquitous computing. In Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007 (pp. 1359-1363). [4318010] (Proceedings - International Conference on Computer Communications and Networks, ICCCN). https://doi.org/10.1109/ICCCN.2007.4318010