Enhanced low-cost RFID protocol to detect relay attacks

被引:6
作者
Munilla, Jorge [1 ]
Peinado, Alberto [1 ]
机构
[1] Univ Malaga, ETSI Telecomunicac, E-29071 Malaga, Spain
关键词
contactless smart card; RFID; relay attack; distance bounding protocol; void-challenge;
D O I
10.1002/wcm.769
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contactless smart cards are more and more used in access control and payment systems. However, most of such cards are Vulnerable to relay attacks. also known as mafia fraud attacks. This attack requires simpler technical resources than tampering or cryptanalysis. In this the adversary deceives, the verifier into thinking that a genuine prover is close by relaying the messages between both genuine parties. The main countermeasure against this attack is the use of so-called distance bounding protocols. In the radio frequency identification (RFID) framework, Hancke and Kuhn proposed the first distance bounding protocol, which resorts to an expensive and complex ultra wide band (UWB) radio link. Reid et al. remove this extra radio link and propose a low-cost protocol, but some aspects still need to be further investigated. In this paper, we propose an enhanced low-cost protocol which takes advantage of the special characteristics of the inductive communication in RFID, and the use of 'void-challenges' to protect against relay attacks. The processing delay of this protocol is zero and it can be directly implemented on RFID devices, Without resorting to any extra resources. We present experimental results to support our arguments. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:361 / 371
页数:11
相关论文
共 17 条
  • [1] [Anonymous], 14443 ISO
  • [2] [Anonymous], 2007, P 1 INT EURASIP WORK
  • [3] AVOINE G, 2005, THESIS ECOLE POLYTEC
  • [4] CARLUCCIO D, 2006, WORKSH RFID SEC GRAZ
  • [5] Finkenzeller K., 2003, RFID HDB FUNDAMENTAL, V2nd ed.
  • [6] FISHKIN K, 2003, RFID PRIV WORKSH
  • [7] Hancke G., 2005, PRACTICAL RELAY ATTA
  • [8] HANCKE G, 2005, P IEEE SECURECOMM
  • [9] KFIR Z, 2005, 2005052 CRYPT EPRINT
  • [10] Mangard S, 2008, Power analysis attacks: Revealing the secrets of smart cards