Detecting Clocking Attack in Contactless Access Control Systems

被引:1
作者
Tian, Guixiang [1 ]
Lu, Li [1 ]
Hussain, Muhammad Jawad [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
来源
2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) | 2017年
关键词
contactless access control systems; clocking attack; synchronization clock;
D O I
10.1109/CBD.2017.56
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contactless access control systems (referred to as CACS) exchange information between contactless smart cards and readers. They have been widely employed in our daily life. To ensure the correctness, both sides of the communication need to be synchronized by embedding synchronization clock into data. However, the clock can be speeded up by attacker to shorten the processing time of demodulating received signals and reply in advance. To address this problem, in this paper, we propose the first general cross-layer scheme to detect clocking attack in CACS by combing data integrity protection and physical layer implementation. Smart cards feed back check-sum of synchronization clock by shifting the response signal's frequency instead of transmitting extra bits. Hence, attacker can't modify the feedback checksum. Reader can use checksum to check whether communication is under clocking attack or not. We show the proposed scheme can be implemented in contactless smart cards and conduct extensive experiments on existing computational radio frequency identification (RFID) tags and reader.
引用
收藏
页码:285 / 290
页数:6
相关论文
共 8 条
[1]  
[Anonymous], 1993, Lecture Notes in Computer Science
[2]  
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[3]  
Hancke GP, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P194
[4]   An RFID distance bounding protocol [J].
Hancke, GP ;
Kuhn, MG .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :67-73
[5]   TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices [J].
Hussain, Muhammad Jawad ;
Lu, Li ;
Zhu, Hongzi .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (06) :3076-3085
[6]  
Kawaguchi D., 2014, Data clock recovery loop jam set using subcarrier frequency estimate, Patent No. [US8731118B2, 8731118]
[7]  
Li GJ, 2011, INFORMATION SCIENCE AND TECHNOLOGY IN CHINA: A ROADMAP TO 2050, P19
[8]   A FMCW-Based Cross Layer RF Distance Bounding Scheme [J].
Lu, Li ;
Hussain, Muhammad Jawad ;
Han, Zhigang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :4009-4016