A New and Efficient Distance Bounding Protocol

被引:0
|
作者
Mushtaq, Muddassar [1 ]
Afzal, Mehreen [1 ]
Wahla, Muhammad Arif [1 ]
机构
[1] Natl Univ Sci & Technol, Mil Coll Signals, Informat Secur Dept, Islamabad, Pakistan
关键词
Relay attacks; Low-cost RFID tags; Distance Bounding Protocol;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID tags are exposed to different location based attacks including mafia-fraud and terrorist-fraud attacks. These attacks are also called relay attacks and are very difficult to prevent, as they are similar to a man-in-the-middle attack. Distance bounding protocols are a very good solution to thwart such type of attacks and is very popular area of research now a days. Different Distance-Bounding protocols (DBPs) have been presented over the time, however, most of them are either found vulnerable against relay attacks or are too complex to implement in low-cost resource constrained RFID tags. In this paper, we have analyzed different DBPs and have proposed a novel and efficient Distance Bounding protocol. The proposed protocol provides the ideal resistance against mafia fraud and terrorist fraud attacks with reduced computation, memory and communication overheads.
引用
收藏
页码:33 / 36
页数:4
相关论文
共 50 条
  • [41] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [42] Challenges in Distance Bounding
    Boureanu, Ioana
    Vaudenay, Serge
    IEEE SECURITY & PRIVACY, 2015, 13 (01) : 41 - 48
  • [43] Quantum Distance Bounding
    Abidin, Aysajan
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 233 - 238
  • [44] Distance Lower Bounding
    Zheng, Xifan
    Safavi-Naini, Reihaneh
    Ahmadi, Hadi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 89 - 104
  • [45] New Attacks and Secure Design for Anonymous Distance-Bounding
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    Akand, Mamunur
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 598 - 616
  • [46] A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol
    Bultel, Xavier
    Gambs, Sebastien
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    Robert, Jean-Marc
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 121 - 133
  • [47] An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
    Hoda Jannati
    Abolfazl Falahati
    Wireless Personal Communications, 2015, 85 : 711 - 726
  • [48] An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
    Jannati, Hoda
    Falahati, Abolfazl
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 711 - 726
  • [49] Distance-bounding trust protocol in anonymous radio-frequency identification systems
    Yang, Fan
    Zhang, Fengli
    Wang, Jiahao
    Qin, Zhiguang
    Yuan, Xiaolu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (16): : 4211 - 4229
  • [50] A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme
    Song, Yihang
    Li, Songfan
    Zhang, Chong
    Lu, Li
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021