Security and privacy analysis of RFID systems using model checking

Hyun Seok Kim, Il Gon Kim, Keun Hee Han, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Title of host publicationHigh Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings
PublisherSpringer Verlag
Pages495-504
Number of pages10
ISBN (Print)3540393684, 9783540393689
DOIs
Publication statusPublished - 2006
Event2nd International Conference on High Performance Computing and Communications, HPCC 2006 - Munich, Germany
Duration: 2006 Sept 132006 Sept 15

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4208 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on High Performance Computing and Communications, HPCC 2006
Country/TerritoryGermany
CityMunich
Period06/9/1306/9/15

Keywords

  • CSP
  • Casper
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Security and privacy analysis of RFID systems using model checking'. Together they form a unique fingerprint.

Cite this