Distance-bounding protocol with time-stamped authentication for RFID

被引:0
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2014年
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [21] Optimal Security Limits of RFID Distance Bounding Protocols
    Kara, Orhun
    Kardas, Suleyman
    Bingol, Muhammed Ali
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
  • [22] A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel
    Shafiee, Ebrahim
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 38 (04) : 248 - 262
  • [23] MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
    Xin, Wei
    Tang, Cong
    Xiong, Hu
    Wang, Yonggang
    Sun, Huiping
    Guan, Zhi
    Chen, Zhong
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 129 - 143
  • [24] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [25] Hardware Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Yuan, Ching-Chien
    Chen, Ming-Kun
    Lin, Wei-Cheng
    Teng, Hsien-Chiao
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (05) : 1573 - 1582
  • [26] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [27] RFID lightweight authentication protocol based on PRF
    Jin, Yongming
    Wu, Qiying
    Shi, Zhiqiang
    Lu, Xiang
    Sun, Limin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1506 - 1514
  • [28] An Efficient and Secure Authentication Protocol for RFID Systems
    Monzur Morshed
    Anthony Atkins
    International Journal of Automation and Computing, 2012, (03) : 257 - 265
  • [29] An Efficient and Secure Authentication Protocol for RFID Systems
    Morshed, Md. Monzur
    Atkins, Anthony
    Yu, Hong-Nian
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (03) : 257 - 265
  • [30] Efficient Public-Key Distance Bounding Protocol
    Kilinc, Handan
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 873 - 901