RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud
نویسندگان
چکیده
منابع مشابه
Mafia fraud attack against the RČ Distance-Bounding Protocol
At ACM CCS 2008, Rasmussen and Čapkun introduced a distance-bounding protocol [22] (henceforth RČ protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden marker) and receiving the response. Thus, the verifier is able to compute an upper bound on the distance separating it and the prover. Distanc...
متن کاملShedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...
متن کاملTerrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance
In distance-bounding protocols, verifiers use a clock to measure the time elapsed in challenge-response rounds, thus upper-bounding their distance to the prover. This should prevent man-in-the-middle (MITM) relay attacks. Distance-bounding protocols may aim to prevent several attacks, amongst which terrorist fraud, where a dishonest prover helps the adversary to authenticate, but without passin...
متن کاملThe Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the verifier and an out-of-field prover. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short aut...
متن کاملAn Ultra-lightweight RFID Distance Bounding Protocol
Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korea Information and Communications Society
سال: 2014
ISSN: 1226-4717
DOI: 10.7840/kics.2014.39a.11.660