Analysis of the RFID security protocol for secure smart home network

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

    Research output: Contribution to conferencePaperpeer-review

    8 Citations (Scopus)

    Abstract

    RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

    Original languageEnglish
    Pages356-363
    Number of pages8
    DOIs
    Publication statusPublished - 2006
    Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
    Duration: 2006 Nov 92006 Nov 11

    Other

    Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
    Country/TerritoryKorea, Republic of
    CityCheju Island
    Period06/11/906/11/11

    Keywords

    • CSP
    • Casper
    • FDR
    • Model checking
    • RFID security

    ASJC Scopus subject areas

    • Media Technology

    Fingerprint

    Dive into the research topics of 'Analysis of the RFID security protocol for secure smart home network'. Together they form a unique fingerprint.

    Cite this