The design and verification of RFID authentication protocol for ubiquitous computing

被引:0
作者
Kim, Hyun-Seok [1 ]
Choi, Jin-Young [1 ]
机构
[1] Korea Univ, Dept Comp Sci, Seoul 136701, South Korea
来源
DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS | 2007年
关键词
authentication protocol; model checking; RFID;
D O I
10.1109/DEXA.2007.6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
引用
收藏
页码:693 / +
页数:2
相关论文
共 14 条
[1]  
*FORM SYST LTD, 1999, FDR2 US MAN
[2]  
GILBERT H, 2004, ACTIVE ATTACK HBPLUS
[3]  
GONG L, 1990, 1990 IEEE S SEC PRIV, P18
[4]  
HENRICI D, 2004, HASH BASED ENHANCEME, P149
[5]  
Hoare C. A. R., 1985, COMMUNICATING SEQUEN
[6]  
Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293
[7]  
Juels A, 2003, LECT NOTES COMPUT SC, V2742, P103
[8]  
KATZ J, 2005, PARALLEL CONCURRENT
[9]  
Kim HS, 2006, P INT COMP SOFTW APP, P195
[10]   Casper: A compiler for the analysis of security protocols [J].
Lowe, G .
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, :18-30