Distance Bounding Protocol for Multiple RFID Tag Authentication

被引:11
|
作者
Kapoor, Gaurav [1 ]
Zhou, Wei [1 ]
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Dept ISOM, Gainesville, FL 32611 USA
关键词
D O I
10.1109/EUC.2008.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it ill any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple lags are authenticated for their simultaneous presence in the field of the reader.
引用
收藏
页码:115 / 120
页数:6
相关论文
共 50 条
  • [31] Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding
    Kachhia, Ruchi
    Agrawal, Prachi
    Das, Manik Lal
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 339 - 348
  • [32] On the Use of m-Ary Challenges for RFID Distance Bounding Protocol
    Kim, Young-Sik
    Kim, Sang-Hyo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (09) : 2028 - 2035
  • [33] A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    Kardas, Suleyman
    Kiraz, Mehmet Sabir
    Bingol, Muhammed Ali
    Demirci, Huseyin
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 78 - 93
  • [34] Research on Multiple security authentication protocol in RFID System
    Xia, Hui
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 770 - 773
  • [35] A Symmetric Key based RFID Authentication Protocol using Encrypted Tag ID
    Shin, Juseok
    Park, Yongsoo
    Kim, Sungsoo
    Kim, Youngbak
    Kim, Kyungoul
    Choi, Wonseok
    Ahn, Kwangseon
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 851 - 852
  • [36] Hardware implementation of tag-reader mutual authentication protocol for RFID systems
    Vijaykumar, V. R.
    Elango, S.
    INTEGRATION-THE VLSI JOURNAL, 2014, 47 (01) : 123 - 129
  • [37] Secure and efficient lightweight RFID authentication protocol based on fast tag indexing
    Pang, Liaojun
    Li, Huixian
    He, Liwei
    Alramadhan, Ali
    Wang, Yumin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 3244 - 3254
  • [38] RFID tag-based mutual authentication protocol with improved security for TMIS
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 383 - 405
  • [39] Lightweight RFID dual-tag authentication protocol using cloud and PUF
    Ai L.
    Chang Z.
    Fan W.
    Kong D.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (01): : 177 - 191
  • [40] RFID Authentication and Communication Protocol based on the Dynamic Active Tag ID and Key
    Zhang Xiaohong
    Wang Huiqin
    Bo He
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1913 - +