Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

作者: Hoda Jannati

DOI: 10.1016/J.IJCIP.2015.08.001

关键词:

摘要: Radio Frequency Identification (RFID) technology is used in myriad applications because of its speed execution, ease manufacturing and usability. In the domain critical infrastructure protection, RFID systems are often to identify people, objects vehicles that enter restricted areas, track packages cargo containers. Relay attacks known pose serious threats authentication protocols systems. 2014, Urien Piramuthu proposed an protocol simultaneously uses a temperature sensor distance bounding scheme protect from relay attacks. They claim provides maximum level security against as well related terrorist fraud This paper shows Urien-Piramuthu vulnerable all three with attacker success probabilities 100%, implying cannot

参考文章(31)
Hoda Jannati, Abolfazl Falahati, An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach Wireless Personal Communications. ,vol. 85, pp. 711- 726 ,(2015) , 10.1007/S11277-015-2804-5
Saar Drimer, Steven J Murdoch, None, Keep your enemies close: distance bounding against smartcard relay attacks usenix security symposium. pp. 7- ,(2007)
Kasper Bonne Rasmussen, Srdjan Čapkun, Realization of RF distance bounding usenix security symposium. pp. 25- 25 ,(2010)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Aurélien Francillon, Boris Danev, Srdjan Capkun, None, Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars network and distributed system security symposium. ,(2011) , 10.3929/ETHZ-A-006708714
Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardaş, Cédric Lauradoux, Benjamin Martin, A framework for analyzing RFID distance bounding protocols Journal of Computer Security. ,vol. 19, pp. 289- 317 ,(2011) , 10.3233/JCS-2010-0408
Wolfgang Issovits, Michael Hutter, Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks international conference on rfid. pp. 335- 342 ,(2011) , 10.1109/RFID-TA.2011.6068658
G.P. Hancke, K.E. Mayes, K. Markantonakis, Confidence in smart token proximity: Relay attacks revisited Computers & Security. ,vol. 28, pp. 615- 627 ,(2009) , 10.1016/J.COSE.2009.06.001
Tao Yang, Lingbo Kong, Wei Xin, Jianbin Hu, Zhong Chen, Resisting relay attacks on vehicular Passive Keyless Entry and start systems fuzzy systems and knowledge discovery. pp. 2232- 2236 ,(2012) , 10.1109/FSKD.2012.6234155
Abolfazl Falahati, Hoda Jannati, All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices Electronic Commerce Research. ,vol. 15, pp. 75- 95 ,(2015) , 10.1007/S10660-014-9167-Y