Distance-bounding protocol with time-stamped authentication for RFID

被引:0
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2014年
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
[41]   Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption [J].
Ye Qiao ;
Sun ZiWen .
PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, :5629-5634
[42]   Server-less RFID authentication and searching protocol with enhanced security [J].
Lee, Chin-Feng ;
Chien, Hung-Yu ;
Laih, Chi-Sung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) :376-385
[43]   Lightweight Authentication Protocol for RFID-enabled Systems based on ECC [J].
Kaur, Kuljeet ;
Kumar, Neeraj ;
Singh, Mukesh ;
Obaidat, Mohammad S. .
2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
[44]   Super Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operation [J].
Hou, Yubao ;
Liang, Hua ;
Liu, Juan .
INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (01) :63-77
[45]   Super lightweight mobile RFID authentication protocol for bit replacement operation [J].
Hou, Yubao ;
Liang, Hua ;
Liu, Juan .
INTERNATIONAL JOURNAL OF RF TECHNOLOGIES-RESEARCH AND APPLICATIONS, 2020, 11 (02) :143-157
[46]   AN EFFICIENT RFID ANONYMOUS BATCH AUTHENTICATION PROTOCOL BASED ON GROUP SIGNATURE [J].
Xu, Jie ;
Dang, Lanjun .
DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5) :1489-1500
[47]   Design and analysis of the light-weight mutual authentication protocol for RFID [J].
Li, Huixian .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2012, 39 (01) :172-178
[48]   Analysis of Unilateral Distance Bounding Protocol with Mixed Predefined and Bidirectional Challenges over a Noisy Communication Channel [J].
Jannati, Hoda ;
Falahati, Abolfazl .
2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, :1550-1554
[49]   Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel [J].
Jannati, Hoda ;
Falahati, Abolfazl .
INFORMATION PROCESSING LETTERS, 2015, 115 (6-8) :623-629
[50]   Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate [J].
Kim, Chong Hee .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) :1078-1080