Vulnerability aware graphs for RFID protocol security benchmarking

作者:

Highlights:

摘要

Security and privacy issues in Radio Frequency Identification (RFID) systems mainly result from limited storage and computation resources of RFID tags and unpredictable communication environment. Although many security protocols for RFID system have been proposed, most of them have various flaws. We propose a random graph-based methodology enabling automated benchmarking of RFID security. First, we formalize the capability of adversaries by a set of atomic actions. Second, Vulnerability Aware Graphs (VAGs) were developed to elaborate the interactions between adversaries and RFID systems, which are used to discover the potential attacks of adversaries via some paths on the graphs. The quantitative analysis on VAGs can predict the probability that the adversary leverages the potential flaws to perform attacks. Moreover, a joint entropy-based method is provided to measure the indistinguishability of RFID tags under passive attacks. Analysis and simulation were conducted to show the validity and effectiveness of VAGs.

论文关键词:RFID,Security protocol,Vulnerability aware graphs,Benchmarking

论文评审过程:Received 21 April 2014, Revised 22 September 2014, Accepted 2 October 2014, Available online 29 December 2014.

论文官网地址:https://doi.org/10.1016/j.jcss.2014.12.015