首页> 外文期刊>Wireless personal communications: An Internaional Journal >Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
【24h】

Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code

机译:基于哈希函数和密码的RFID认证协议的形式验证

获取原文
获取原文并翻译 | 示例
           

摘要

Radio frequency identification (RFID) systems have recently been in wide use across industries. RFID systems are characterized by the wireless data communication between readers and tags. Accordingly, the very wireless communication is vulnerable to security issues and likely to become a target of intrusion (Khor in Wirel Pers Commun 59(1): 17-26, 2011, Habibi and Aref in Wirel Pers Commun 69(4): 1583-1596, 2013). Regarding RFID security issues, many studies have dealt with a range of protocols. A range of security protocols including hash-locking and that suggested by Kenji et al. have been proposed in the form of theorem proving, but found over time by many scholars to have security vulnerabilities. The present study experimentally applied formal specification techniques to hash-locking and Kenji et al.'s protocols and verified their vulnerabilities. The security vulnerabilities of the proposed protocols can hardly be found with theorem proving. Protocols proposed based on theorem proving are often found to have unexpected vulnerabilities by other investigators. Also, many of those protocols are applied to real systems without precise understanding of what their investigators suggest and often implemented after many trials and errors. Hence, it is a very important issue to develop some techniques capable of analyzing vulnerabilities at earlier stages of initial design via automated verification methods. As a means of solving the security issues relevant to RFID systems, the present study verifies the protocols using formalization tools and proposes an RFID security protocol based on hash locks, public keys and secret keys. The proposed protocol designed to have no security vulnerabilities does not require unnecessary calculations and meets the formal verification, i.e. safety verification, deadlock verification and livelock verification. To develop and verify a secure protocol, the present study uses Casper and Failure Divergence Refinements (FDR) tools and confirms the proposed protocol is safe and secure. With the verification of security, traces(Q) traces(P) was found to be met. Similarly, with the verification of deadlock, failures(Q) failures(P) was confirmed. Finally, with the verification of live-lock, the fail/branch model of the process proved to be in deadlock and live-lock. Also, P FDQ failures(Q) failures(P) divergences(Q) divergences(P) was confirmed and found secure based on the FDR verification results. These findings indicate that the proposed protocol is applicable to RFID wireless security systems, meets the security requirements, facilitates implementation of secure systems and is usable for a range of application techniques.
机译:射频识别(RFID)系统最近已在各个行业广泛使用。 RFID系统的特征在于读取器和标签之间的无线数据通信。因此,非常无线的通信容易受到安全问题的影响,并且很可能成为入侵的目标(Khor在Wirel Pers Commun 59(1):17-26,2011; Habibi和Aref在Wirel Pers Commun 69(4):1583- 1596,2013)。关于RFID安全性问题,许多研究都涉及一系列协议。 Kenji等人建议的一系列安全协议,包括散列锁定。已经以定理证明的形式提出了这些建议,但是随着时间的流逝,许多学者发现它们存在安全漏洞。本研究通过实验将形式规范技术应用于哈希锁和Kenji等人的协议,并验证了它们的漏洞。定理证明几乎找不到所提议协议的安全漏洞。基于定理证明提出的协议经常被其他研究人员发现具有意想不到的漏洞。同样,这些协议中的许多协议在没有准确了解其研究人员建议的情况下应用于实际系统,并且经常在经过多次试验和错误后才实施。因此,开发一些能够通过自动验证方法在初始设计的早期阶段分析漏洞的技术是一个非常重要的问题。作为解决与RFID系统相关的安全问题的一种方法,本研究使用形式化工具验证协议,并提出一种基于哈希锁,公钥和秘密密钥的RFID安全协议。设计为没有安全漏洞的拟议协议不需要进行不必要的计算,并且可以满足形式验证,即安全验证,死锁验证和活锁验证。为了开发和验证安全协议,本研究使用了Casper和故障发散细化(FDR)工具,并证实了所提出的协议是安全的。通过安全性验证,发现符合迹线(Q)和迹线(P)。同样,通过验证死锁,可以确认失败(Q),失败(P)。最后,通过对实时锁定的验证,该过程的失败/分支模型被证明为死锁和实时锁定。此外,基于FDR验证结果,已确认P FDQ失败(Q)失败(P)分歧(Q)分歧(P),并发现其安全性。这些发现表明,所提出的协议适用于RFID无线安全系统,满足安全要求,促进安全系统的实施,并可用于多种应用技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号