Distance-bounding protocol with time-stamped authentication for RFID

被引:0
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2014年
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
[21]   Lightweight Bidirectional Authentication Protocol for RFID [J].
He, Jiaqi ;
Peng, Changgen ;
Fu, Zhangjie ;
Xu, Dequan ;
Tang, Hanlin .
Computer Engineering and Applications, 2023, 59 (18) :268-277
[22]   Optimal Security Limits of RFID Distance Bounding Protocols [J].
Kara, Orhun ;
Kardas, Suleyman ;
Bingol, Muhammed Ali ;
Avoine, Gildas .
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 :220-+
[23]   A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel [J].
Shafiee, Ebrahim ;
Falahati, Abolfazl .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 38 (04) :248-262
[24]   MEED: A Memory-efficient Distance Bounding Protocol with Error Detection [J].
Xin, Wei ;
Tang, Cong ;
Xiong, Hu ;
Wang, Yonggang ;
Sun, Huiping ;
Guan, Zhi ;
Chen, Zhong .
RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 :129-143
[25]   An Efficient and Secure Authentication Protocol for RFID Systems [J].
Morshed, Md. Monzur ;
Atkins, Anthony ;
Yu, Hong-Nian .
INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (03) :257-265
[26]   A Lightweight Authentication Protocol Scheme for RFID Security [J].
WEI Guoheng ;
ZHANG Huanguo .
Wuhan University Journal of Natural Sciences, 2013, 18 (06) :504-510
[27]   RFID lightweight authentication protocol based on PRF [J].
Jin, Yongming ;
Wu, Qiying ;
Shi, Zhiqiang ;
Lu, Xiang ;
Sun, Limin .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07) :1506-1514
[28]   ECC-Based RFID Authentication Protocol [J].
Yang X.-C. ;
Xu C.-X. ;
Li C.-R. .
Journal of Electronic Science and Technology, 2020, 18 (04) :320-329
[29]   Hardware Implementation of RFID Mutual Authentication Protocol [J].
Huang, Yu-Jung ;
Yuan, Ching-Chien ;
Chen, Ming-Kun ;
Lin, Wei-Cheng ;
Teng, Hsien-Chiao .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (05) :1573-1582
[30]   An Efficient and Secure Authentication Protocol for RFID Systems [J].
Monzur Morshed ;
Anthony Atkins .
International Journal of Automation and Computing, 2012, (03) :257-265