Distance-bounding protocol with time-stamped authentication for RFID

被引:0
|
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [41] Measuring Asymmetry in Time-Stamped Phylogenies
    Dearlove, Bethany L.
    Frost, Simon D. W.
    PLOS COMPUTATIONAL BIOLOGY, 2015, 11 (07)
  • [42] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [43] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
  • [44] A novel multi-hop distance-bounding protocol used in wireless sensor networks
    Luo, Han-guang
    Su, Jian
    Wen, Guang-jun
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [45] A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
    Avoine, Gildas
    Bultel, Xavier
    Gambs, Sebastien
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    Robert, Jean-Marc
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 800 - 814
  • [46] Rapid time-stamped analysis of filament motility
    Ijpma, Gijs
    Balassy, Zsombor
    Lauzon, Anne-Marie
    JOURNAL OF MUSCLE RESEARCH AND CELL MOTILITY, 2018, 39 (5-6) : 153 - 162
  • [47] Filtering of randomly sampled, time-stamped measurements
    Barford, Lee
    2006 IEEE INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE PROCEEDINGS, VOLS 1-5, 2006, : 1021 - 1026
  • [48] Rapid time-stamped analysis of filament motility
    Gijs Ijpma
    Zsombor Balassy
    Anne-Marie Lauzon
    Journal of Muscle Research and Cell Motility, 2018, 39 : 153 - 162
  • [49] A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol
    Entezari, Rahim
    Bahramgiri, Hossein
    Tajamolian, Mahnaz
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 67 - 72
  • [50] A Class of Precomputation-based Distance-bounding Protocols
    Mauw, Sjouke
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 97 - 111