The design and verification of RFID authentication protocol for ubiquitous computing

Hyun Seok Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings - International Workshop on Database and Expert Systems Applications, DEXA
Pages693-697
Number of pages5
DOIs
Publication statusPublished - 2007 Dec 1
EventDEXA 2007 18th International Workshop on Database and Expert Systems Applications - Regensburg, Germany
Duration: 2007 Sep 32007 Sep 7

Other

OtherDEXA 2007 18th International Workshop on Database and Expert Systems Applications
CountryGermany
CityRegensburg
Period07/9/307/9/7

Fingerprint

Ubiquitous computing
Radio frequency identification (RFID)
Authentication
Network protocols
Model checking
Cryptography
Identification (control systems)

Keywords

  • Authentication protocol
  • Model checking
  • RFID

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kim, H. S., & Choi, J. Y. (2007). The design and verification of RFID authentication protocol for ubiquitous computing. In Proceedings - International Workshop on Database and Expert Systems Applications, DEXA (pp. 693-697). [4312983] https://doi.org/10.1109/DEXA.2007.6

The design and verification of RFID authentication protocol for ubiquitous computing. / Kim, Hyun Seok; Choi, Jin Young.

Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2007. p. 693-697 4312983.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS & Choi, JY 2007, The design and verification of RFID authentication protocol for ubiquitous computing. in Proceedings - International Workshop on Database and Expert Systems Applications, DEXA., 4312983, pp. 693-697, DEXA 2007 18th International Workshop on Database and Expert Systems Applications, Regensburg, Germany, 07/9/3. https://doi.org/10.1109/DEXA.2007.6
Kim HS, Choi JY. The design and verification of RFID authentication protocol for ubiquitous computing. In Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2007. p. 693-697. 4312983 https://doi.org/10.1109/DEXA.2007.6
Kim, Hyun Seok ; Choi, Jin Young. / The design and verification of RFID authentication protocol for ubiquitous computing. Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2007. pp. 693-697
@inproceedings{5dfae6f2b59f4c76ba882ad4fba9a38c,
title = "The design and verification of RFID authentication protocol for ubiquitous computing",
abstract = "The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.",
keywords = "Authentication protocol, Model checking, RFID",
author = "Kim, {Hyun Seok} and Choi, {Jin Young}",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/DEXA.2007.6",
language = "English",
isbn = "0769529321",
pages = "693--697",
booktitle = "Proceedings - International Workshop on Database and Expert Systems Applications, DEXA",

}

TY - GEN

T1 - The design and verification of RFID authentication protocol for ubiquitous computing

AU - Kim, Hyun Seok

AU - Choi, Jin Young

PY - 2007/12/1

Y1 - 2007/12/1

N2 - The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

AB - The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

KW - Authentication protocol

KW - Model checking

KW - RFID

UR - http://www.scopus.com/inward/record.url?scp=47849104526&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=47849104526&partnerID=8YFLogxK

U2 - 10.1109/DEXA.2007.6

DO - 10.1109/DEXA.2007.6

M3 - Conference contribution

AN - SCOPUS:47849104526

SN - 0769529321

SN - 9780769529325

SP - 693

EP - 697

BT - Proceedings - International Workshop on Database and Expert Systems Applications, DEXA

ER -