Distance-bounding protocol with time-stamped authentication for RFID

被引:0
|
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [21] Image authentication with a time-stamped signature of the image and secret key encryption
    Cheng, JY
    Chang, LW
    ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 91 - 98
  • [22] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257
  • [23] On the design of time-stamped signatures
    Sun, HM
    Chen, BC
    Yeh, HT
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2004, 68 (03) : 598 - 610
  • [24] Time-stamped claim logic
    Rasga, João
    Sernadas, Cristina
    Karafili, Erisa
    Viganò, Luca
    Logic Journal of the IGPL, 2021, 29 (03): : 303 - 332
  • [25] Practical and Provably Secure Distance-Bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 248 - 258
  • [26] Time-stamped claim logic
    Rasga, Joao
    Sernadas, Cristina
    Karafili, Erisa
    Vigano, Luca
    LOGIC JOURNAL OF THE IGPL, 2021, 29 (03) : 303 - 332
  • [27] Mechanised Models and Proofs for Distance-Bounding
    Boureanu, Ioana
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Gerault, David
    Lafourcade, Pascal
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 591 - 606
  • [28] A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol
    Bultel, Xavier
    Gambs, Sebastien
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    Robert, Jean-Marc
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 121 - 133
  • [29] Distance-bounding trust protocol in anonymous radio-frequency identification systems
    Yang, Fan
    Zhang, Fengli
    Wang, Jiahao
    Qin, Zhiguang
    Yuan, Xiaolu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (16): : 4211 - 4229
  • [30] A New Secure Authentication Based Distance Bounding Protocol
    Sultan A.R.
    Rashid I.
    Khan F.
    Tahir S.
    Pasha M.
    Sultan A.
    PeerJ Computer Science, 2021, 7 : 1 - 28