Distance Bounding Protocol for Multiple RFID Tag Authentication

被引:11
|
作者
Kapoor, Gaurav [1 ]
Zhou, Wei [1 ]
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Dept ISOM, Gainesville, FL 32611 USA
关键词
D O I
10.1109/EUC.2008.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it ill any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple lags are authenticated for their simultaneous presence in the field of the reader.
引用
收藏
页码:115 / 120
页数:6
相关论文
共 50 条
  • [1] Distance-bounding protocol with time-stamped authentication for RFID
    Wei Guo-heng
    Zhang Huan-guo
    Li Zheng
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 139 - 145
  • [2] An RFID distance bounding protocol
    Hancke, GP
    Kuhn, MG
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 67 - 73
  • [3] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [4] Distance Bounding Protocol for RFID Systems
    Zhou, Yajian
    Zhou, Jingxian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 241 - 249
  • [5] An Efficient RFID Distance Bounding Protocol
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 367 - 376
  • [6] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692
  • [7] An Authentication Protocol for RFID Tag and its Simulation
    Shang-Ping W.
    Qiao-Mei M.
    Ya-Ling Z.
    You-Sheng L.
    Journal of Networks, 2011, 6 (03) : 446 - 453
  • [8] Efficient RFID authentication protocol for minimizing RFID tag computation
    Rhee, Keunwoo
    Kwak, Jin
    Yi, Wan S.
    Park, Chanho
    Park, Sangjoon
    Yang, Hyungkyu
    Kim, Seungjoo
    Won, Dongho
    ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 607 - +
  • [9] A Lightweight and Practical RFID Grouping Authentication Protocol in Multiple-Tag Arrangements
    Shen, Jian
    Tan, Haowen
    Chang, Shaohua
    Ren, Yongjun
    Liu, Qi
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 681 - 686
  • [10] Mutual Authentication of RFID Tag with Multiple Readers
    Piramuthu, Selwyn
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 357 - 361