{"title":"Formal verification of RFID protocols using nuXmv","authors":"Guanjie Yuan, Shigong Long","doi":"10.1109/ICASID.2016.7873917","DOIUrl":null,"url":null,"abstract":"The security of Radio-Frequency Identification (RFID) tags are one of the key prerequisites for its commercial application. Due to its limited computing power, formal verification protocols are an important prerequisite to effectively answering the challenges of security in RFID systems. By means of nuXmv, a clear and concise symbolic model checker, a methodology for verifying RFID protocols is put forward. We illustrate this approach by describing our analysis of hash-lock protocol, a well-known RFID protocol. We verified some properties of the protocol and discussed the security issues of hash-lock protocol. We proposed an attacker model which is appropriate for hash-lock protocol.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2016.7873917","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The security of Radio-Frequency Identification (RFID) tags are one of the key prerequisites for its commercial application. Due to its limited computing power, formal verification protocols are an important prerequisite to effectively answering the challenges of security in RFID systems. By means of nuXmv, a clear and concise symbolic model checker, a methodology for verifying RFID protocols is put forward. We illustrate this approach by describing our analysis of hash-lock protocol, a well-known RFID protocol. We verified some properties of the protocol and discussed the security issues of hash-lock protocol. We proposed an attacker model which is appropriate for hash-lock protocol.