The design and verification of RFID authentication protocol for ubiquitous computing

Hyun Seok Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Original languageEnglish
Title of host publicationProceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications
Pages693-697
Number of pages5
DOIs
Publication statusPublished - 2007
EventDEXA 2007 18th International Workshop on Database and Expert Systems Applications - Regensburg, Germany
Duration: 2007 Sept 32007 Sept 7

Publication series

NameProceedings - International Workshop on Database and Expert Systems Applications, DEXA
ISSN (Print)1529-4188

Other

OtherDEXA 2007 18th International Workshop on Database and Expert Systems Applications
Country/TerritoryGermany
CityRegensburg
Period07/9/307/9/7

Keywords

  • Authentication protocol
  • Model checking
  • RFID

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'The design and verification of RFID authentication protocol for ubiquitous computing'. Together they form a unique fingerprint.

Cite this