The vulnerabilities analysis and design of the security protocol for RFID system

Hyun Seok Kim, Jung Hyun Oh, Jin Young Choi, Jin Woo Kim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.

    Original languageEnglish
    Title of host publicationProceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
    DOIs
    Publication statusPublished - 2006
    Event6th IEEE International Conference on Computer and Information Technology, CIT 2006 - Seoul, Korea, Republic of
    Duration: 2006 Sept 202006 Sept 22

    Publication series

    NameProceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006

    Other

    Other6th IEEE International Conference on Computer and Information Technology, CIT 2006
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period06/9/2006/9/22

    Keywords

    • CSP
    • Casper
    • FDR
    • Model checking
    • RFID security

    ASJC Scopus subject areas

    • Computer Science Applications
    • Information Systems
    • Software
    • General Mathematics

    Fingerprint

    Dive into the research topics of 'The vulnerabilities analysis and design of the security protocol for RFID system'. Together they form a unique fingerprint.

    Cite this