RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

نویسندگان

  • Chong Hee Kim
  • Gildas Avoine
چکیده

RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack. All the existing distance bounding protocols based on binary challenges, without final signature, provide an adversary success probability equal to (3/4) where n is the number of rounds in the protocol. In this paper, we introduce a new protocol based on binary mixed challenges that converges toward the expected and optimal (1/2) bound. We prove its security in case of both noisy and non-noisy channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID Distance Bounding Multistate Enhancement (Short Version)

Distance bounding protocols aim at avoiding relay attacks during an authentication process. They are particularly awaited in RFID, where mounting a relay attack between a lowcapability prover and a remote verifier is no longer fiction. Several distance bounding protocols suited to RFID have been recently suggested, all targeting to reduce the two related quantities: adversary’s success probabil...

متن کامل

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...

متن کامل

Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System

The most important characteristic of RFID-based electronic voting system compared to traditional voting system is that votes in the electronic system are as contactless smart cards in place of paper ballots. For casting ballots, voters use a computer terminal to write their choices (their chosen candidates) into contactless smart cards and then put the smart card inside the box. The most import...

متن کامل

An Ultra-lightweight RFID Distance Bounding Protocol

Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...

متن کامل

Design of a secure distance-bounding channel for RFID

Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009