Distance-bounding protocol with time-stamped authentication for RFID

被引:0
|
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [1] A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID
    WEI Guoheng
    ZHANG Huanguo
    WANG Ya
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 37 - 46
  • [2] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [4] Distance Bounding Protocol for Multiple RFID Tag Authentication
    Kapoor, Gaurav
    Zhou, Wei
    Piramuthu, Selwyn
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120
  • [5] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [6] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [7] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [8] An RFID distance bounding protocol
    Hancke, GP
    Kuhn, MG
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 67 - 73
  • [9] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [10] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212