Optimal Security Limits of RFID Distance Bounding Protocols

被引:0
|
作者
Kara, Orhun [1 ]
Kardas, Suleyman [1 ,2 ]
Bingol, Muhammed Ali [1 ,3 ]
Avoine, Gildas [4 ]
机构
[1] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[2] Sabanci Univ, TR-34956 Istanbul, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] UCL, Informat Secur Grp, Louvain, Belgium
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES | 2010年 / 6370卷
关键词
RFID; distance bounding protocol; security; mafia fraud; distance fraud; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-POD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [31] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [32] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [33] Security of RFID Protocols - A Case Study
    van Deursen, Ton
    Radomirovic, Sasa
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 : 41 - 52
  • [34] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [35] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10) : 1216 - 1227
  • [36] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [37] Distance Bounding with Delayed Responses
    Lee, Sangho
    Kim, Jin Seok
    Hong, Sung Je
    Kim, Jong
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (09) : 1478 - 1481
  • [38] Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
    Jannati, Hoda
    Falahati, Abolfazl
    INFORMATION PROCESSING LETTERS, 2015, 115 (6-8) : 623 - 629
  • [39] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [40] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    Wireless Personal Communications, 2011, 59 : 43 - 56