@inproceedings{37b2637e57f14601862699cb17bdd50d,
title = "The vulnerabilities analysis and design of the security protocol for RFID system",
abstract = "Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this paper, we present an RFID authentication protocol that enforces user privacy and protects man-in-the-middle, replay attacks between reader and tag. In analyzing our protocol, we specify several known attacks that can be applied to RFID protocol with Casper, CSP and then verify their security propeties such as secrecy and authetication using FDR model checking tool.",
keywords = "CSP, Casper, FDR, Model checking, RFID security",
author = "Kim, {Hyun Seok} and Oh, {Jung Hyun} and Choi, {Jin Young} and Kim, {Jin Woo}",
year = "2006",
doi = "10.1109/CIT.2006.180",
language = "English",
isbn = "076952687X",
series = "Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006",
booktitle = "Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006",
note = "6th IEEE International Conference on Computer and Information Technology, CIT 2006 ; Conference date: 20-09-2006 Through 22-09-2006",
}