Formal verification of a key establishment protocol for EPC Gen2 RFID systems: Work in progress

Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The EPC Class-1 Generation-2 (Gen2 for short) is a standard Radio Frequency Identification (RFID) technology that has gained a prominent place on the retail industry. The Gen2 standard lacks, however, of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of monitoring applications based on the Gen2 technology. We are working on a key establishment protocol that aims at addressing this problem. The protocol is applied at both the initial identification phase and those remainder operations that may require security, such as password protected operations. We specify the protocol using the High Level Protocol Specification Language (HLPSL). Then, we verify the secrecy property of the protocol using the AVISPA model checker tool. The results that we report show that the current version of the protocol guarantees sensitive data secrecy under the presence of a passive adversary.

Original languageEnglish
Title of host publicationFoundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Revised Selected Papers
Pages242-251
Number of pages10
DOIs
Publication statusPublished - 27 Jan 2012
Externally publishedYes
Event4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011 - Paris, France
Duration: 12 May 201113 May 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6888 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011
Country/TerritoryFrance
CityParis
Period12/05/1113/05/11

Fingerprint

Dive into the research topics of 'Formal verification of a key establishment protocol for EPC Gen2 RFID systems: Work in progress'. Together they form a unique fingerprint.

Cite this