RFID Distance Bounding Protocols with Mixed Challenges

被引:38
作者
Kim, Chong Hee [1 ]
Avoine, Gildas [1 ]
机构
[1] Catholic Univ Louvain, Informat Secur Grp, Dept Comp Sci & Engn, Louvain, Belgium
关键词
RFID; authentication; distance bounding protocol; relay attack; distance fraud;
D O I
10.1109/TWC.2011.030411.101158
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in-the-middle who relays the signal between the two entities, possibly without knowing the specifications of the protocol used on the channel. Recently, distance bounding protocols measuring the round-trip times of messages exchanged between the reader and the tag have been designed to prevent this attack. Almost all the existing proposals are based on binary challenges, with no final signature, and provide a mafia fraud success probability equal to (3/4)(n), where n is the number of rounds in the protocol, or require too much memory. In this article, we introduce new distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2)(n) bound and which only require little memory.
引用
收藏
页码:1618 / 1626
页数:9
相关论文
共 19 条
[1]  
AVOINE G, 2010, J COMPUT SECURITY
[2]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[3]  
Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
[4]  
Brands Stefan., 1994, EUROCRYPT'93, V765, P344
[5]  
Bussard L, 2005, INT FED INFO PROC, V181, P223
[6]  
Bussard L., 2003, LECT NOTES COMPUTER, V2802, P119
[7]  
CAPKUN S, P INFOCOM, P1917
[8]  
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[9]  
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P21
[10]  
DESMEDT Y, P SECURICOM 88, P15