RFID Distance Bounding Protocols
نویسندگان
چکیده
Almost all existing RFID tag/reader authentication protocols are vulnerable to mafia attacks and/or terrorist attacks from adversaries because of their inability to verify location of the tag. Several protocols have been proposed that purport to alleviate these forms of attacks. However, vulnerabilities have been identified in most of these protocols. We present and evaluate a modified distance bounding protocol.
منابع مشابه
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze and design new distance bounding protocols. We first formalize the adversary scenarios, the protocol mean...
متن کاملRFID Distance Bounding Multistate Enhancement (Short Version)
Distance bounding protocols aim at avoiding relay attacks during an authentication process. They are particularly awaited in RFID, where mounting a relay attack between a lowcapability prover and a remote verifier is no longer fiction. Several distance bounding protocols suited to RFID have been recently suggested, all targeting to reduce the two related quantities: adversary’s success probabil...
متن کاملTimed Analysis of RFID Distance Bounding Protocols
Modelling real time is fundamental to reason about pervasive systems. The formal analysis of some time sensitive security protocols, such as distance bounding protocols, could lead to a more formal approach to time dependent properties formalisation and verification of pervasive systems.
متن کاملDesign of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...
متن کاملA Formal Approach to Distance-Bounding RFID Protocols
Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different sessions; (2) Terrorist attacks where the adversary gets limited active support from the prover to imperson...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007