Security and privacy analysis of RFID systems using model checking

Hyun Seok Kim, Il Gon Kim, Keun Hee Han, Jin Young Choi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.

    Original languageEnglish
    Title of host publicationHigh Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings
    PublisherSpringer Verlag
    Pages495-504
    Number of pages10
    ISBN (Print)3540393684, 9783540393689
    DOIs
    Publication statusPublished - 2006
    Event2nd International Conference on High Performance Computing and Communications, HPCC 2006 - Munich, Germany
    Duration: 2006 Sept 132006 Sept 15

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4208 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other2nd International Conference on High Performance Computing and Communications, HPCC 2006
    Country/TerritoryGermany
    CityMunich
    Period06/9/1306/9/15

    Keywords

    • CSP
    • Casper
    • FDR
    • Model checking
    • RFID security

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Security and privacy analysis of RFID systems using model checking'. Together they form a unique fingerprint.

    Cite this