Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress

被引:0
作者
Tounsi, Wiem [1 ]
Cuppens-Boulahia, Nora [1 ]
Cuppens, Frederic [1 ]
Garcia-Alfaro, Joaquin [1 ]
机构
[1] Telecom Bretagne, Inst Telecom, F-35576 Cesson Sevigne, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY | 2011年 / 6888卷
关键词
SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The EPC Class-1 Generation-2 (Gen2 for short) is a standard Radio Frequency Identification (RFID) technology that has gained a prominent place on the retail industry. The Gen2 standard lacks, however, of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of monitoring applications based on the Gen2 technology. We are working on a key establishment protocol that aims at addressing this problem. The protocol is applied at both the initial identification phase and those remainder operations that may require security, such as password protected operations. We specify the protocol using the High Level Protocol Specification Language (HLPSL). Then, we verify the secrecy property of the protocol using the AVISPA model checker tool. The results that we report show that the current version of the protocol guarantees sensitive data secrecy under the presence of a passive adversary.
引用
收藏
页码:242 / 251
页数:10
相关论文
共 17 条
[1]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[2]   SATMC: A SAT-based model checker for security protocols [J].
Armando, A ;
Compagna, L .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :730-733
[3]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[4]  
Boichut Y., 2004, Proc. Int. Workshop on Automated Verification of Infinite-State Systems (AVIS 2004), P1
[5]  
Cao Tianjie, 2008, IEEE T DEPEND SECURE, P73
[6]  
Chevalier Y., 2004, SAPS, P193
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]  
EPCglobal, EPC RAD FREQ ID PROT
[9]  
Garcia-Alfaro J., 2009, 2 SETOP INT WORKSH A, P193
[10]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394