Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

作者: Pedro Peris-Lopez , Julio C. Hernandez-Castro , Juan M. E. Tapiador , Esther Palomar , Jan C.A. van der Lubbe

DOI: 10.1109/RFID.2010.5467258

关键词:

摘要: Widespread adoption of RFID technology is being slowed down because increasing public concerns about associated security threats. This paper shows that it possible to enhance the systems by requiring readers perform a computational effort test. Readers must solve cryptographic puzzle - one components Weakly Secret Bit Commitment (WSBC) sent tags obtain static identifier interrogated tag. The method we present based on simple concept already used in applications such as anti-spam or TCP SYN flooding protection, yet original context until now. scheme provides privacy protection while an effective countermeasure against indiscriminate disclosure whole contents large number tags. Then, scrutinize combined use puzzles and distance-bounding protocols. First, classical relatively straight-forward solution presented. Secondly, introduce protocol named Noent, follows new approach reduces drawbacks with WSBC key delegation, whilst gaining all advantages employing protocols certainty distance between tag reader.

参考文章(34)
Kwangjo Kim, Sangshin Lee, Tomoyuki Asano, RFID mutual Authentication Scheme based on Synchronized Secret Information scandinavian conference on information systems. pp. 98- 98 ,(2006)
J Park, K Ren, Kwangjo Kim, J Yang, H Lee, Mutual Authentication Protocol for Low-cost RFID international cryptology conference. pp. 17- 24 ,(2005)
David Molnar, Andrea Soppera, David Wagner, A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags international conference on selected areas in cryptography. pp. 276- 290 ,(2005) , 10.1007/11693383_19
Eun Young Choi, Su Mi Lee, Dong Hoon Lee, Efficient RFID Authentication Protocol for Ubiquitous Computing Environment Embedded and Ubiquitous Computing – EUC 2005 Workshops. pp. 945- 954 ,(2005) , 10.1007/11596042_97
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Melanie R. Rieback, Aikaterini Mitrokotsa, Andrew S. Tanenbaum, Classification of RFID Attacks international workshop on rfid technology. pp. 73- 86 ,(2008)
Lars R. Knudsen, Frédéric Muller, Some Attacks Against a Double Length Hash Proposal Lecture Notes in Computer Science. pp. 462- 473 ,(2005) , 10.1007/11593447_25
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
Chong Hee Kim, Gildas Avoine, RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks cryptology and network security. ,vol. 5888, pp. 119- 133 ,(2009) , 10.1007/978-3-642-10433-6_9