@inproceedings{5dfae6f2b59f4c76ba882ad4fba9a38c,
title = "The design and verification of RFID authentication protocol for ubiquitous computing",
abstract = "The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.",
keywords = "Authentication protocol, Model checking, RFID",
author = "Kim, {Hyun Seok} and Choi, {Jin Young}",
year = "2007",
doi = "10.1109/DEXA.2007.6",
language = "English",
isbn = "0769529321",
series = "Proceedings - International Workshop on Database and Expert Systems Applications, DEXA",
pages = "693--697",
booktitle = "Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications",
note = "DEXA 2007 18th International Workshop on Database and Expert Systems Applications ; Conference date: 03-09-2007 Through 07-09-2007",
}