Inductive Method for Evaluating RFID Security Protocols
Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosio...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2019/2138468 |
id |
doaj-a34e1dd555fa47d8b3fac4312c9adeb4 |
---|---|
record_format |
Article |
spelling |
doaj-a34e1dd555fa47d8b3fac4312c9adeb42020-11-24T22:14:52ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/21384682138468Inductive Method for Evaluating RFID Security ProtocolsDefu Liu0Guowu Yang1Yong Huang2Jinzhao Wu3Big Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, ChinaBig Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, ChinaGuangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi University for Nationalities, Nanning, 530006, ChinaGuangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi University for Nationalities, Nanning, 530006, ChinaAuthentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.http://dx.doi.org/10.1155/2019/2138468 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Defu Liu Guowu Yang Yong Huang Jinzhao Wu |
spellingShingle |
Defu Liu Guowu Yang Yong Huang Jinzhao Wu Inductive Method for Evaluating RFID Security Protocols Wireless Communications and Mobile Computing |
author_facet |
Defu Liu Guowu Yang Yong Huang Jinzhao Wu |
author_sort |
Defu Liu |
title |
Inductive Method for Evaluating RFID Security Protocols |
title_short |
Inductive Method for Evaluating RFID Security Protocols |
title_full |
Inductive Method for Evaluating RFID Security Protocols |
title_fullStr |
Inductive Method for Evaluating RFID Security Protocols |
title_full_unstemmed |
Inductive Method for Evaluating RFID Security Protocols |
title_sort |
inductive method for evaluating rfid security protocols |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2019-01-01 |
description |
Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks. |
url |
http://dx.doi.org/10.1155/2019/2138468 |
work_keys_str_mv |
AT defuliu inductivemethodforevaluatingrfidsecurityprotocols AT guowuyang inductivemethodforevaluatingrfidsecurityprotocols AT yonghuang inductivemethodforevaluatingrfidsecurityprotocols AT jinzhaowu inductivemethodforevaluatingrfidsecurityprotocols |
_version_ |
1725796747955929088 |