Security Analysis of RFID Authentication for Pervasive Systems using Model Checking
- 1 January 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2, 195-202
- https://doi.org/10.1109/compsac.2006.158
Abstract
Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost importance. In this paper, we describe problems of previous works on RFID security protocol and specify several known attacks with Casper, CSP and then verify their security properties such as secrecy and authentication using FDR model checking tool. Finally, we propose an RFID security protocol based on strong authentication that guarantees data privacy and authentication between a tag and a readerKeywords
This publication has 2 references indexed in Scilit:
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Relations between secrets: two formal analyses of the Yahalom protocolJournal of Computer Security, 2001