Security and privacy analysis of RFID authentication protocol for ubiquitous computing

被引:0
作者
Kim, Hyun-Seok [1 ]
Choi, Jin-Young [2 ]
机构
[1] Korea Mil Acad, Dept Elect Engn & Informat Sci, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3 | 2007年
关键词
authentication protocol; model checking; capser; FDR; RFID;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to he identified automatically in mobile and ubiquitous computing. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce a modified RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.
引用
收藏
页码:1359 / +
页数:2
相关论文
共 9 条
  • [1] *FORM SYST LTD, 1999, FDR2 US MAN
  • [2] GONG L, 1990, 1990 IEEE S SEC PRIV, P18
  • [3] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
  • [4] Hoare C. A. R., 1985, COMMUNICATING SEQUEN
  • [5] Juels A, 2003, LECT NOTES COMPUT SC, V2742, P103
  • [6] Casper: A compiler for the analysis of security protocols
    Lowe, G
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 18 - 30
  • [7] Ohkubo M, 2004, PROC S CRYPTOGR INF, P719
  • [8] Ryan P.Y. A., 2001, MODELLING ANAL SECUR
  • [9] Sarma SE, 2002, LECT NOTES COMPUT SC, V2523, P454