Title :
Distance Bounding Protocol for Multiple RFID Tag Authentication
Author :
Kapoor, Gaurav ; Zhou, Wei ; Piramuthu, Selwyn
Author_Institution :
Dept. of ISOM, Univ. of Florida, Gainesville, FL
Abstract :
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple tags are authenticated for their simultaneous presence in the field of the reader.
Keywords :
cryptographic protocols; radiofrequency identification; cryptographic protocols; distance bounding protocol; multiple RFID tag authentication; relay attacks; Authentication; Clocks; Cryptographic protocols; ISO; Privacy; Protective relaying; RFID tags; Relays; Time measurement; Ubiquitous computing; Distance bounding protocol; RFID; multiple tags;
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
DOI :
10.1109/EUC.2008.48