RFID Distance-Bounding: What is Wrong and How to Fix it

ثبت نشده
چکیده

Radio Frequency Identification (RFID), the technology for contactless transmission of data between small devices and readers, penetrates more and more our daily life. The technology is nowadays used in passports, transponder keys, or logistics, usually as a mean to identify the tag to the reader. Security solutions for such devices are often vulnerable to so-called man-in-the-middle (MITM) attacks where an adversary tries to impersonate as the device by communicating with the actual RFID tag while talking to the reader, relaying the tag’s data to the reader. Such attacks have been reported in practice, e.g., for the HB protocol, for smartcards, and even for Passive Keyless Entry and Start (PKES) systems in cars [14]. Distance-bounding protocols aim at impeding such attacks by measuring response times: MITM attacks are supposed to take larger response times than executions with the actual tag. So far, many proposed protocols have later been broken, which we attribute to a lack of profound models and formal security claims. In this work we thus give an overview of distance-bounding RFID modeling and design issues. More concretely, we compare the two prominent models in [2,13], assessing how far the definitions capture the intuition behind them. Finally, we describe how to achieve distance bounding security, giving an overview of the techniques most often used in practice.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

متن کامل

Design of a secure distance-bounding channel for RFID

Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...

متن کامل

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; (2) terrorist fraud, where...

متن کامل

A Formal Approach to Distance-Bounding RFID Protocols

Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different sessions; (2) Terrorist attacks where the adversary gets limited active support from the prover to imperson...

متن کامل

An Ultra-lightweight RFID Distance Bounding Protocol

Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014