Non-uniform Stepping Approach to RFID Distance Bounding Problem

被引:0
作者
Gurel, Ali Ozhan [1 ]
Arslan, Atakan [1 ]
Akgun, Mete [1 ]
机构
[1] TUBITAK UEKAE, TR-41470 Gebze, Kocaeli, Turkey
来源
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY | 2011年 / 6514卷
关键词
CHALLENGES; PROTOCOL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID systems are vulnerable to relay attacks (mafia fraud and terrorist fraud) as well as distance fraud. Several distance bounding protocols suitable to RFID systems were proposed to avoid these attacks. The common point of these protocols is to try to reduce success probability of the attacker. To the best of our knowledge, there is no RFID distance bounding protocol without final signature that provides success probability of attacker smaller than (3/4)(n) in the presence of all frauds. In this paper, we propose an RFID distance bounding protocol that creates binary responses by traversing the register with non-uniform steps based on the secret key in addition to binary challenges. Our protocol without final signature is the first to converge the success probability of the attacker to the ideal case, which is (1/2)(n) for all frauds. Furthermore, our protocol is robust against disturbances of channel, has low computational cost and also provides privacy.
引用
收藏
页码:64 / 78
页数:15
相关论文
共 23 条
[1]  
[Anonymous], 2003, RFID HDB FUNDAMENTAL
[2]  
Avoine G., 2010, J COMPUTER SECURITY
[3]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[4]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[5]  
Bussard L., THESIS ENST PARIS
[6]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[7]  
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P21
[8]  
Drimer S., 2007, P USENIX SEC
[9]  
HANCKE G, 2005, PRACTICAL RELA UNPUB
[10]   An RFID distance bounding protocol [J].
Hancke, GP ;
Kuhn, MG .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :67-73