Distance-bounding protocol with time-stamped authentication for RFID

被引:0
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2014年
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
[31]   Untraceable security proof for RFID authentication protocol [J].
Zhai, Jingxuan ;
Cao, Tianjie ;
Chen, Xiuqing .
Journal of Computational Information Systems, 2015, 11 (09) :3121-3129
[32]   Efficient Public-Key Distance Bounding Protocol [J].
Kilinc, Handan ;
Vaudenay, Serge .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :873-901
[33]   Distance Bounding Protocol with Adjustable False Acceptance Rate [J].
Yum, Dae Hyun ;
Kim, Jin Seok ;
Hong, Sung Je ;
Lee, Pil Joong .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) :434-436
[34]   Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels [J].
Munilla, Jorge ;
Peinado, Alberto .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (09) :1227-1232
[35]   An efficient RFID authentication protocol using dynamic identity [J].
Chiou, Shin-Yan .
International Journal of Network Security, 2019, 21 (05) :728-734
[36]   Rfid authentication protocol design via BAN logic [J].
Wang, Minghui, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06)
[37]   RFID mutual authentication protocol based on chaos key [J].
Zhang Nan ;
Zhang Jianhua ;
Yang Jun .
ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 :1519-1523
[38]   EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags [J].
Guo-Rui Li1 Ying Wang2 Cui-Rong Wang1 Jing-Sha He3 1Electronic Information Department .
International Journal of Automation and Computing, 2012, (01) :108-112
[39]   EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags [J].
Li, Guo-Rui ;
Wang, Ying ;
Wang, Cui-Rong ;
He, Jing-Sha .
INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (01) :108-112
[40]   Efficient LFSR Based Distance Bounding Protocol for Contactless EMV Payments [J].
Shah, Trishla ;
Sampalli, Srinivas .
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 :275-290