Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys

세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증

  • 배우식 (아주자동차대학 전산실) ;
  • 이종연 (충북대학교 디지털정보융합학과)
  • Received : 2012.10.23
  • Accepted : 2012.11.20
  • Published : 2012.11.30


Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.


Supported by : 교육과학기술부