Formal Analysis and Verification for Three-Party Authentication Protocol of RFID

被引:1
|
作者
Chen, Jia [1 ]
Xiao, Meihua [1 ]
Yang, Ke [1 ]
Li, Wei [2 ]
Zhong, Xiaomei [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] CRRC Zhuzhou Locomot Co Ltd, Intelligent Network Res & Dev Dept, Zhuzhou 412001, Hunan, Peoples R China
来源
THEORETICAL COMPUTER SCIENCE (NCTCS 2018) | 2018年 / 882卷
基金
中国国家自然科学基金;
关键词
RFID three-party authentication protocol; Model checking; Multi-channel modeling; SECURITY;
D O I
10.1007/978-981-13-2712-4_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID three-party authentication protocol based on NTRU cryptosystem is a type of multi-entities authentication protocol. Unlike other RFID mutual authentication protocols, this protocol realizes mutual authentication of Server to Reader, and Server to Tag. Model checking is a formal method to check the correctness specifications hold in each state on concurrent and distributed systems, which can be used to verify the security of network protocol. A multi-channels constructing method is proposed to build this protocol model for formal analysis, then authentication property of the protocol is verified by model checker SPIN. Formal verification result reveals that an attack exists in this protocol, hence the protocol cannot guarantee the security of the three-party authentication protocol. The modeling method proposed above has great significance on security analysis for such three-party authentication protocols.
引用
收藏
页码:46 / 60
页数:15
相关论文
共 50 条
  • [1] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [2] FORMAL ANALYSIS OF A NOVEL RFID AUTHENTICATION PROTOCOL
    Chikouche, Noureddine
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [3] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [4] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [5] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [6] Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps
    Pak, Kyongsok
    Pak, Songho
    Ho, Cholman
    Pak, Myongsuk
    Hwang, Choljin
    PLOS ONE, 2019, 14 (03):
  • [7] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [8] The design and verification of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 693 - +
  • [9] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
  • [10] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603