CLASSIFICATION, FORMALIZATION AND AUTOMATIC VERIFICATION OF UNTRACEABILITY IN RFID PROTOCOLS

作者: Ali Khadem Mohtaram

DOI:

关键词:

摘要: Resume Les protocoles securite RFID sont des sous-ensembles cryptographiques mais avec fonctions legeres. Leur objectif principal est l'identification a l'egard de certaines proprietes intimite comme la non-tracabilite et confidentialite l'avant. La un point essentielle societe d'aujourd'hui. Un protocole d'identification devrait non seulement permettre lecteur legitime d'authentifier tag, il faut aussi proteger du tag. Des failles ont ete decouvertes dans plupart ces protocoles, en depit quantite considerable temps d'efforts requis pour conception mise œuvre cryptographiques. responsabilite verification adequate devient cruciale. Les methodes formelles peuvent jouer role essentiel le developpement fiables. Les systemes critiques qui necessitent une haute fiabilite tels que les difficiles evaluer utilisant tests conventionnels techniques simulation. Cela eu effet concentrer recherches sur formelle assurer degre eleve fiabilite. Par consequent, faites ce domaine, definition explicite n'ont pas encore donnee. L'objectif cette these demontrer l'utilisation analyser RFID. Plusieurs definitions donnees litterature non-tracabilite, n'y d'accord sa exacte. Nous avons introduit trois niveaux differents propriete concerne experiences existantes. egalement classe toutes existantes points forts litterature. De plus, notre approche utilise specifiquement calculs processus pi calcul appliques creer modele protocole. demontrons nos proposees l'applique etudes cas existants.----------Abstract RFID protocols are subsets of cryptographic but with lightweight functions. Their main objective is identification respect to some privacy properties, like anonymity, untraceability and forward secrecy. Privacy the essential part today's society. An protocol should not only allow legitimate reader authenticate tag also it protect Although design implementation tedious time consuming, security flaws have been discovered in most protocols. Therefore responsibility for reliable proper becomes crucial. Formal methods can play an development Critical systems which require high reliability such as difficult be evaluated using conventional simulation techniques. This has encouraged researchers focus on formal ensure degree systems. In spite studies carried out this field, explicit properties still missing.

参考文章(64)
Shingo Kinoshita, Miyako Ohkubo, Koutarou Suzuki, Cryptographic Approach to “Privacy-Friendly” Tags ,(2003)
Sima Khashkhashi Moghaddam, Gholamreza Nakhaeizadeh, Elham Naghizade Kakhki, An Improved Data Warehouse Model for RFID Data in Supply Chain Intelligent Information and Database Systems. pp. 488- 497 ,(2012) , 10.1007/978-3-642-28487-8_51
K. S. Kushal, H. K. Muttanna Kadal, S. Chetan, Shivaputra, Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks Advances in Intelligent Systems and Computing. pp. 499- 505 ,(2012) , 10.1007/978-3-642-30111-7_47
Kwangjo Kim, Sangshin Lee, Tomoyuki Asano, RFID mutual Authentication Scheme based on Synchronized Secret Information scandinavian conference on information systems. pp. 98- 98 ,(2006)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Tom Chothia, Vitaliy Smirnov, A traceability attack against e-passports financial cryptography. ,vol. 6052, pp. 20- 34 ,(2010) , 10.1007/978-3-642-14577-3_5
Khaled Ouafi, Raphael C. -W. Phan, Privacy of recent RFID authentication protocols information security practice and experience. pp. 263- 277 ,(2008) , 10.1007/978-3-540-79104-1_19
Jean Souyris, Virginie Wiels, David Delmas, Hervé Delseny, Formal Verification of Avionics Software Products formal methods. ,vol. 5850, pp. 532- 546 ,(2009) , 10.1007/978-3-642-05089-3_34