Abstract
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID systems will be therefore of utmost important. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authenticaion that guarantees data privacy and authentication between a tag and a reader.
This work was supported by Ministry of Commerce, Industry and Energy of Korea and the RFID Research Center of Korea University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sarma, S., Weis, S., Engels, D.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
EPCGLOBAL INC., http://www.epcglobalinc.org
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: 1st Intern. Conference on Security in Pervasive Computing (SPC) (2003)
Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)
Lowe, G.: Casper: A compiler for the analysis of security protocols. In: Proceeding of the 1997 IEEE Computer Security Foundations Workshop X, pp. 18–30. IEEE Computer Society, Silver Spring, MD (1997)
Formal Systems Ltd. FDR2 User Manual (August 1999)
Ryan, P.Y.A., Schneider, S.A.: Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, Reading (2001)
Paulson, L.C.: Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, HS., Kim, IG., Han, KH., Choi, JY. (2006). Security and Privacy Analysis of RFID Systems Using Model Checking. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_51
Download citation
DOI: https://doi.org/10.1007/11847366_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39368-9
Online ISBN: 978-3-540-39372-6
eBook Packages: Computer ScienceComputer Science (R0)