首页|Inductive Method for Evaluating RFID Security Protocols
Inductive Method for Evaluating RFID Security Protocols
扫码查看
点击上方二维码区域,可以放大扫码查看
原文链接
NSTL
Wiley-Hindawi
Authentication protocol verification is a difficult problem. The problem of "state space explosion" has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of "state space explosion" in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.
Defu Liu、Guowu Yang、Yong Huang、Jinzhao Wu
展开 >
Big Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China
Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi University for Nationalities