Security and privacy analysis of RFID authentication protocol for ubiquitous computing

被引:0
|
作者
Kim, Hyun-Seok [1 ]
Choi, Jin-Young [2 ]
机构
[1] Korea Mil Acad, Dept Elect Engn & Informat Sci, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
authentication protocol; model checking; capser; FDR; RFID;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to he identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
引用
下载
收藏
页码:1359 / +
页数:2
相关论文
共 50 条
  • [21] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [22] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +
  • [23] SPUC: Security protocol for ubiquitous computing
    Yang, Fan
    Lv, Qingcong
    Cao, Qiying
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
  • [24] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [25] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [26] Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
    Kim, Hun-Wook
    Lim, Shu-Yun
    Lee, Hoon-Jae
    2006 International Conference on Hybrid Information Technology, Vol 2, Proceedings, 2006, : 718 - 723
  • [27] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [28] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [29] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [30] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105