DocumentCode :
1478920
Title :
RFID Distance Bounding Protocols with Mixed Challenges
Author :
Kim, Chong Hee ; Avoine, Gildas
Author_Institution :
Inf. Security Group, Univ. Catholique de Louvain, Louvain-la-Neuve, Belgium
Volume :
10
Issue :
5
fYear :
2011
fDate :
5/1/2011 12:00:00 AM
Firstpage :
1618
Lastpage :
1626
Abstract :
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in-the-middle who relays the signal between the two entities, possibly without knowing the specifications of the protocol used on the channel. Recently, distance bounding protocols measuring the round-trip times of messages exchanged between the reader and the tag have been designed to prevent this attack. Almost all the existing proposals are based on binary challenges, with no final signature, and provide a mafia fraud success probability equal to (3/4)n, where n is the number of rounds in the protocol, or require too much memory. In this article, we introduce new distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2)n bound and which only require little memory.
Keywords :
protocols; radiofrequency identification; telecommunication security; RFID; binary mixed challenge; distance bounding protocols; message round trip time; Clocks; Memory management; Protocols; Radiofrequency identification; Terrorism; Wireless communication; RFID; authentication; distance bounding protocol; distance fraud; relay attack;
fLanguage :
English
Journal_Title :
Wireless Communications, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1276
Type :
jour
DOI :
10.1109/TWC.2011.030411.101158
Filename :
5737892
Link To Document :
بازگشت