The vulnerabilities analysis and design of the security protocol for RFID system

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi, Jin Woo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.

Original languageEnglish
Title of host publicationProceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
DOIs
Publication statusPublished - 2006
Event6th IEEE International Conference on Computer and Information Technology, CIT 2006 - Seoul, Korea, Republic of
Duration: 2006 Sep 202006 Sep 22

Publication series

NameProceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006

Other

Other6th IEEE International Conference on Computer and Information Technology, CIT 2006
CountryKorea, Republic of
CitySeoul
Period06/9/2006/9/22

Keywords

  • CSP
  • Casper
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software
  • Mathematics(all)

Fingerprint Dive into the research topics of 'The vulnerabilities analysis and design of the security protocol for RFID system'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Oh, J. H., Choi, J. Y., & Kim, J. W. (2006). The vulnerabilities analysis and design of the security protocol for RFID system. In Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006 [4019943] (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006). https://doi.org/10.1109/CIT.2006.180