A New and Efficient Distance Bounding Protocol

被引:0
|
作者
Mushtaq, Muddassar [1 ]
Afzal, Mehreen [1 ]
Wahla, Muhammad Arif [1 ]
机构
[1] Natl Univ Sci & Technol, Mil Coll Signals, Informat Secur Dept, Islamabad, Pakistan
关键词
Relay attacks; Low-cost RFID tags; Distance Bounding Protocol;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID tags are exposed to different location based attacks including mafia-fraud and terrorist-fraud attacks. These attacks are also called relay attacks and are very difficult to prevent, as they are similar to a man-in-the-middle attack. Distance bounding protocols are a very good solution to thwart such type of attacks and is very popular area of research now a days. Different Distance-Bounding protocols (DBPs) have been presented over the time, however, most of them are either found vulnerable against relay attacks or are too complex to implement in low-cost resource constrained RFID tags. In this paper, we have analyzed different DBPs and have proposed a novel and efficient Distance Bounding protocol. The proposed protocol provides the ideal resistance against mafia fraud and terrorist fraud attacks with reduced computation, memory and communication overheads.
引用
收藏
页码:33 / 36
页数:4
相关论文
共 50 条
  • [31] A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    Kardas, Suleyman
    Kiraz, Mehmet Sabir
    Bingol, Muhammed Ali
    Demirci, Huseyin
    RFID SECURITY AND PRIVACY, 2012, 7055 : 78 - 93
  • [32] On the Use of m-Ary Challenges for RFID Distance Bounding Protocol
    Kim, Young-Sik
    Kim, Sang-Hyo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (09) : 2028 - 2035
  • [33] Towards More Security Distance Bounding Protocol to prevent relay attacks
    Zhou, Jingxian
    Xiao, Feng
    Gu, Zhaojun
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1741 - 1748
  • [34] Distance-bounding protocol with time-stamped authentication for RFID
    Wei Guo-heng
    Zhang Huan-guo
    Li Zheng
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 139 - 145
  • [35] A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    Kardas, Suleyman
    Kiraz, Mehmet Sabir
    Bingol, Muhammed Ali
    Demirci, Huseyin
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 78 - 93
  • [36] Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR
    Youn, Taek-Young
    Hong, Dowon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (05) : 930 - 935
  • [37] Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate
    Kim, Chong Hee
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1078 - 1080
  • [38] Towards more efficient distance bounding protocols for use in sensor networks
    Meadows, Catherine
    Syverson, Paul
    Chang, Liwu
    2006 SECURECOMM AND WORKSHOPS, 2006, : 41 - +
  • [39] Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors
    Jannati, Hoda
    Bagheri, Nasour
    Safkhani, Masoumeh
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 31 - 36
  • [40] Mutual Implementation of Predefined and Random Challenges over RFID Distance Bounding Protocol
    Jannati, Hoda
    Falahati, Abolfazl
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 43 - 47