The vulnerabilities analysis and design of the security protocol for RFID system

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi, Jin Woo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.

Original languageEnglish
Title of host publicationProceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
DOIs
Publication statusPublished - 2006 Dec 1
Event6th IEEE International Conference on Computer and Information Technology, CIT 2006 - Seoul, Korea, Republic of
Duration: 2006 Sep 202006 Sep 22

Other

Other6th IEEE International Conference on Computer and Information Technology, CIT 2006
CountryKorea, Republic of
CitySeoul
Period06/9/2006/9/22

Fingerprint

Security Protocols
Radio Frequency Identification
Vulnerability
Radio frequency identification (RFID)
Network protocols
Attack
Privacy
Authentication Protocol
Model checking
Authentication
Model Checking
Infrastructure
Verify
Design

Keywords

  • Casper
  • CSP
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software
  • Mathematics(all)

Cite this

Kim, H. S., Oh, J. H., Choi, J. Y., & Kim, J. W. (2006). The vulnerabilities analysis and design of the security protocol for RFID system. In Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006 [4019943] https://doi.org/10.1109/CIT.2006.180

The vulnerabilities analysis and design of the security protocol for RFID system. / Kim, Hyun Seok; Oh, Jung Hyun; Choi, Jin Young; Kim, Jin Woo.

Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 2006. 4019943.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS, Oh, JH, Choi, JY & Kim, JW 2006, The vulnerabilities analysis and design of the security protocol for RFID system. in Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006., 4019943, 6th IEEE International Conference on Computer and Information Technology, CIT 2006, Seoul, Korea, Republic of, 06/9/20. https://doi.org/10.1109/CIT.2006.180
Kim HS, Oh JH, Choi JY, Kim JW. The vulnerabilities analysis and design of the security protocol for RFID system. In Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 2006. 4019943 https://doi.org/10.1109/CIT.2006.180
Kim, Hyun Seok ; Oh, Jung Hyun ; Choi, Jin Young ; Kim, Jin Woo. / The vulnerabilities analysis and design of the security protocol for RFID system. Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 2006.
@inproceedings{37b2637e57f14601862699cb17bdd50d,
title = "The vulnerabilities analysis and design of the security protocol for RFID system",
abstract = "Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.",
keywords = "Casper, CSP, FDR, Model checking, RFID security",
author = "Kim, {Hyun Seok} and Oh, {Jung Hyun} and Choi, {Jin Young} and Kim, {Jin Woo}",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/CIT.2006.180",
language = "English",
isbn = "076952687X",
booktitle = "Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006",

}

TY - GEN

T1 - The vulnerabilities analysis and design of the security protocol for RFID system

AU - Kim, Hyun Seok

AU - Oh, Jung Hyun

AU - Choi, Jin Young

AU - Kim, Jin Woo

PY - 2006/12/1

Y1 - 2006/12/1

N2 - Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.

AB - Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.

KW - Casper

KW - CSP

KW - FDR

KW - Model checking

KW - RFID security

UR - http://www.scopus.com/inward/record.url?scp=34547336633&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34547336633&partnerID=8YFLogxK

U2 - 10.1109/CIT.2006.180

DO - 10.1109/CIT.2006.180

M3 - Conference contribution

AN - SCOPUS:34547336633

SN - 076952687X

SN - 9780769526874

BT - Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006

ER -