Distance-bounding protocol with time-stamped authentication for RFID

被引:0
|
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2014年
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [1] A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID
    WEI Guoheng
    ZHANG Huanguo
    WANG Ya
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 37 - 46
  • [2] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [3] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [4] Distance Bounding Protocol for RFID Systems
    Zhou, Yajian
    Zhou, Jingxian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 241 - 249
  • [5] RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
    Kim, Chong Hee
    Avoine, Gildas
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 119 - 133
  • [6] An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
    Avoine, Gildas
    Tchamkerten, Aslan
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 250 - +
  • [7] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [8] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [9] Mutual Implementation of Predefined and Random Challenges over RFID Distance Bounding Protocol
    Jannati, Hoda
    Falahati, Abolfazl
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 43 - 47
  • [10] An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
    Hoda Jannati
    Abolfazl Falahati
    Wireless Personal Communications, 2015, 85 : 711 - 726