Analysis of the RFID security protocol for secure smart home network

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi

Research output: Contribution to conferencePaperpeer-review

8 Citations (Scopus)

Abstract

RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we analyze the vulnerabilities of the hash based RFID security protocol with Casper, CSP and FDR model checking tool and reconfirm the several known attacks. Finally, we propose the modified hash based RFID security protocol that guarantees data privacy and authentication between a tag and a reader.

Original languageEnglish
Pages356-363
Number of pages8
DOIs
Publication statusPublished - 2006
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
Country/TerritoryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

Keywords

  • CSP
  • Casper
  • FDR
  • Model checking
  • RFID security

ASJC Scopus subject areas

  • Media Technology

Fingerprint

Dive into the research topics of 'Analysis of the RFID security protocol for secure smart home network'. Together they form a unique fingerprint.

Cite this