The Swiss-Knife RFID Distance Bounding Protocol

作者: Chong Hee Kim , Gildas Avoine , François Koeune , François-Xavier Standaert , Olivier Pereira

DOI: 10.1007/978-3-642-00730-9_7

关键词:

摘要: Relay attacks are one of the most challenging threats RFID will have to face in close future. They consist making verifier believe that prover is its vicinity by surreptitiously forwarding signal between and an out-of-field prover. Distance bounding protocols represent a promising way thwart relay attacks, measuring round trip time short authenticated messages. Several such been designed during last years but none them combine all features may expect system. We introduce this paper first solution compounds single protocol these desirable features. We prove, with respect previous protocols, our proposal best terms security, privacy, tag computational overhead, fault tolerance. also point out weakness Tu Piramuthu's protocol, which was considered up now as efficient distance protocol.

参考文章(17)
Julien Iguchi-Cartigny, Jean-Louis Lanet, Dieter Gollmann, Smart Card Research and Advanced Application ,(2011)
Marc Vauclair, Ventzislav Nikov, Yet Another Secure Distance-Bounding Protocol. international conference on security and cryptography. pp. 218- 221 ,(2008)
Dave Singelée, Bart Preneel, Distance bounding in noisy environments security of ad hoc and sensor networks. pp. 101- 115 ,(2007) , 10.1007/978-3-540-73275-4_8
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Georg Hofferek, Johannes Wolkerstorfer, Coupon Recalculation for the GPS Authentication Scheme smart card research and advanced application conference. pp. 162- 175 ,(2008) , 10.1007/978-3-540-85893-5_12
Laurent Bussard, Walid Bagga, Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks information security conference. pp. 223- 238 ,(2005) , 10.1007/0-387-25660-1_15
Alberto Peinado, Jorge Munilla, Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels communications and mobile computing. ,vol. 8, pp. 1227- 1232 ,(2008) , 10.1002/WCM.V8:9
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck, The faithfulness of abstract protocol analysis Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01. ,vol. 12, pp. 186- 195 ,(2001) , 10.1145/501983.502009
Jason Reid, Juan M. Gonzalez Nieto, Tee Tang, Bouchra Senadji, Detecting relay attacks with timing-based protocols Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 204- 213 ,(2007) , 10.1145/1229285.1229314