Security analysis of RFID authentication for pervasive systems using model checking

被引:0
|
作者
Kim, Hyun-Seok [1 ]
Oh, Jeong-Hyun [1 ]
Choi, Jin-Young [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
关键词
model checking; Casper; CSP; FDR; RFID security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio frequency identification (RFID) systems will soon become an. important pail of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
引用
收藏
页码:195 / +
页数:2
相关论文
共 50 条
  • [1] Security and privacy analysis of RFID systems using model checking
    Kim, Hyun-Seok
    Kim, Il-Gon
    Han, Keun-Hee
    Choi, Jin-Young
    [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 495 - 504
  • [2] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [3] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [4] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [5] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [6] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments
    Hoque, Md. Endadul
    Rahman, Farzana
    Ahamed, Sheikh I.
    Park, Jong Hyuk
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 65 - 79
  • [7] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments
    Md. Endadul Hoque
    Farzana Rahman
    Sheikh I. Ahamed
    Jong Hyuk Park
    [J]. Wireless Personal Communications, 2010, 55 : 65 - 79
  • [8] RFID Systems Integrated OTP Security Authentication Design
    Huang, Chao-Hsi
    Huang, Shih-Chih
    [J]. 2013 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2013,
  • [9] Model Checking Pervasive Context-Aware Systems
    Djoudi, Brahim
    Bouanaka, Chafia
    Zeghib, Nadia
    [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 92 - 97
  • [10] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259