RFID Privacy Protection Scheme for Secure Ubiquitous Computing

Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi

Abstract

A Radio-Frequency-Identification (RFID) tag is a small and inexpensive device that consists of an IC chip and an antenna which communicate by radio frequency. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper we describe problems of previous works on RFID security protocols and specify several known attacks and introduce PPP(Privacy Protection Protocol) for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper (A Compiler for Security Protocol), CSP(Communicating Sequential Processes) and then verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

References

  1. Sarma, S., Weis, S., Engels,D.: RFID systems and security and privacy implications. Workshop on Cryptographic Hardware and Embedded Systems(CHES) 2002. LNCS No. 2523 (2003) 454-469
  2. EPCGLOBAL INC.: http://www.epcglobalinc.org.
  3. Gong, L., Needham, R., Yahalom, R.: Reasoning about Belief in Cryptographic Protocols. The 1990 IEEE Symposium on Security and Privacy (1990) 18-36
  4. Juels, A., and Weis, Stephen.: Authenticating Pervasive Devices with Human Protocols. Advances in Cryptology - CRYPTO (2005), LNCS, volume 3621, 293-308.
  5. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall. Englewood Cliffs. NJ (1985)
  6. Lowe, G.: Casper: A compiler for the analysis of security protocols. Proceeding of the 1997 IEEE Computer Security Foundations Workshop X. IEEE Computer Society. Silver Spring. MD (1997) 18-30
  7. Formal Systems Ltd. FDR2 User Manual. Aug. (1999)
  8. Ryan, P. Y. A., Schneider, S. A.: Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley (2001)
  9. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. Proc. of the SCIS 2004. (2004) 719-724
  10. http://formal.korea.ac.kr/~hskim/PPP
Download


Paper Citation


in Harvard Style

Kim H., Oh J. and Choi J. (2007). RFID Privacy Protection Scheme for Secure Ubiquitous Computing . In Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007) ISBN 978-989-8111-01-2, pages 117-124. DOI: 10.5220/0002411201170124


in Bibtex Style

@conference{iwrt07,
author={Hyun-Seok Kim and Jung-Hyun Oh and Jin-Young Choi},
title={RFID Privacy Protection Scheme for Secure Ubiquitous Computing},
booktitle={Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007)},
year={2007},
pages={117-124},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002411201170124},
isbn={978-989-8111-01-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007)
TI - RFID Privacy Protection Scheme for Secure Ubiquitous Computing
SN - 978-989-8111-01-2
AU - Kim H.
AU - Oh J.
AU - Choi J.
PY - 2007
SP - 117
EP - 124
DO - 10.5220/0002411201170124