Security and privacy analysis of RFID systems using model checking

被引:0
|
作者
Kim, Hyun-Seok [1 ]
Kim, Il-Gon
Han, Keun-Hee
Choi, Jin-Young
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Minist Govt Adm & Home Affairs, eGovt Secur Team, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
引用
收藏
页码:495 / 504
页数:10
相关论文
共 50 条
  • [1] Security analysis of RFID authentication for pervasive systems using model checking
    Kim, Hyun-Seok
    Oh, Jeong-Hyun
    Choi, Jin-Young
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +
  • [2] A Security and Privacy Model for Mobile RFID Systems in the Internet of Things
    Zhu, Weiling
    Yu, Jianping
    Wang, Ting
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 726 - 732
  • [3] RFID systems and security and privacy implications
    Sarma, SE
    Weis, SA
    Engels, DW
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 454 - 469
  • [4] Information confinement, privacy, and security in RFID systems
    Di Pietro, Roberto
    Molva, Refik
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 187 - +
  • [5] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    [J]. 2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [6] Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
    Khan, Muhammad Ayaz
    Ullah, Subhan
    Ahmad, Tahir
    Jawad, Khwaja
    Buriro, Attaullah
    [J]. SENSORS, 2023, 23 (12)
  • [7] Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
    Henrici, Dirk
    Mueller, Paul
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 50 - 59
  • [8] Confronting security and privacy threats in modem RFID systems
    Ranasinghe, Damith C.
    Cole, Peter H.
    [J]. 2006 FORTIETH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-5, 2006, : 2058 - +
  • [9] Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems
    Guarda, Paolo
    Ranise, Silvio
    Siswantoro, Hari
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 247 - 254
  • [10] An Approach to Security and Privacy of RFID Systems in Anti-Desynchronization
    Shao, Min-Hua
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 40 - 44