Security and privacy analysis of RFID authentication protocol for ubiquitous computing

被引:0
|
作者
Kim, Hyun-Seok [1 ]
Choi, Jin-Young [2 ]
机构
[1] Korea Mil Acad, Dept Elect Engn & Informat Sci, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
authentication protocol; model checking; capser; FDR; RFID;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to he identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
引用
下载
收藏
页码:1359 / +
页数:2
相关论文
共 50 条
  • [31] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [32] Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices
    Pradeep, B. H.
    Singh, Sanjay
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [33] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [34] PAP: A privacy and authentication protocol for passive RFID tags
    Liu, Alex X.
    Bailey, LeRoy A.
    COMPUTER COMMUNICATIONS, 2009, 32 (7-10) : 1194 - 1199
  • [35] A secure privacy and authentication protocol for passive RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2017, 15 (03) : 266 - 277
  • [36] Scalable RFID mutual authentication protocol with backward privacy
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (06): : 1276 - 1284
  • [37] Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs
    Moradi, Fereidoun
    Mala, Hamid
    Ladani, Behrouz Tork
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (04) : 2607 - 2621
  • [38] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [39] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [40] Trusted Computing to Increase Security and Privacy in eID Authentication
    Vossaert, Jan
    Lapon, Jorn
    De Decker, Bart
    Naessens, Vincent
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 485 - 492