Inductive Method for Evaluating RFID Security Protocols

Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosio...

Full description

Bibliographic Details
Main Authors: Defu Liu, Guowu Yang, Yong Huang, Jinzhao Wu
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2019/2138468
id doaj-a34e1dd555fa47d8b3fac4312c9adeb4
record_format Article
spelling doaj-a34e1dd555fa47d8b3fac4312c9adeb42020-11-24T22:14:52ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/21384682138468Inductive Method for Evaluating RFID Security ProtocolsDefu Liu0Guowu Yang1Yong Huang2Jinzhao Wu3Big Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, ChinaBig Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, ChinaGuangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi University for Nationalities, Nanning, 530006, ChinaGuangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi University for Nationalities, Nanning, 530006, ChinaAuthentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.http://dx.doi.org/10.1155/2019/2138468
collection DOAJ
language English
format Article
sources DOAJ
author Defu Liu
Guowu Yang
Yong Huang
Jinzhao Wu
spellingShingle Defu Liu
Guowu Yang
Yong Huang
Jinzhao Wu
Inductive Method for Evaluating RFID Security Protocols
Wireless Communications and Mobile Computing
author_facet Defu Liu
Guowu Yang
Yong Huang
Jinzhao Wu
author_sort Defu Liu
title Inductive Method for Evaluating RFID Security Protocols
title_short Inductive Method for Evaluating RFID Security Protocols
title_full Inductive Method for Evaluating RFID Security Protocols
title_fullStr Inductive Method for Evaluating RFID Security Protocols
title_full_unstemmed Inductive Method for Evaluating RFID Security Protocols
title_sort inductive method for evaluating rfid security protocols
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2019-01-01
description Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.
url http://dx.doi.org/10.1155/2019/2138468
work_keys_str_mv AT defuliu inductivemethodforevaluatingrfidsecurityprotocols
AT guowuyang inductivemethodforevaluatingrfidsecurityprotocols
AT yonghuang inductivemethodforevaluatingrfidsecurityprotocols
AT jinzhaowu inductivemethodforevaluatingrfidsecurityprotocols
_version_ 1725796747955929088