Security and privacy analysis of RFID authentication protocol for ubiquitous computing

被引:0
|
作者
Kim, Hyun-Seok [1 ]
Choi, Jin-Young [2 ]
机构
[1] Korea Mil Acad, Dept Elect Engn & Informat Sci, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
authentication protocol; model checking; capser; FDR; RFID;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to he identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
引用
下载
收藏
页码:1359 / +
页数:2
相关论文
共 50 条
  • [1] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [2] The design and verification of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 693 - +
  • [3] Efficient RFID authentication protocol for ubiquitous computing environment
    Choi, EY
    Lee, SM
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 945 - 954
  • [4] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [5] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [6] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [7] An Efficient RFID Authentication Protocol Providing Strong Privacy and Security
    Shen, Jian
    Tan, Haowen
    Moh, Sangman
    Chung, Ilyong
    Wang, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (03): : 443 - 455
  • [8] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [9] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [10] A Gen2-Based RFID Authentication Protocol for Security and Privacy
    Sun, Hung-Min
    Ting, Wei-Chih
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1052 - 1062