Optimal Security Limits of RFID Distance Bounding Protocols

被引:0
|
作者
Kara, Orhun [1 ]
Kardas, Suleyman [1 ,2 ]
Bingol, Muhammed Ali [1 ,3 ]
Avoine, Gildas [4 ]
机构
[1] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[2] Sabanci Univ, TR-34956 Istanbul, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] UCL, Informat Secur Grp, Louvain, Belgium
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES | 2010年 / 6370卷
关键词
RFID; distance bounding protocol; security; mafia fraud; distance fraud; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-POD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [41] Untraceable Analysis of Scalable RFID Security Protocols
    Chen, Xiuqing
    Ma, Kai
    Geng, Deqin
    Zhai, Jingxuan
    Liu, Wei
    Zhang, Hongwei
    Zhu, Tingting
    Piao, Xue
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1747 - 1767
  • [42] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [43] Untraceable Analysis of Scalable RFID Security Protocols
    Xiuqing Chen
    Kai Ma
    Deqin Geng
    Jingxuan Zhai
    Wei Liu
    Hongwei Zhang
    Tingting Zhu
    Xue Piao
    Wireless Personal Communications, 2019, 109 : 1747 - 1767
  • [44] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [45] A Note on the Security of Two Improved RFID Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 155 - 160
  • [46] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    Wireless Personal Communications, 2018, 98 : 779 - 814
  • [47] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [48] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [49] Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate
    Kim, Chong Hee
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1078 - 1080
  • [50] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27