期刊文献+

A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID 被引量:2

A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID
原文传递
导出
摘要 Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness. Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness.
出处 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期37-46,共10页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61332019)
关键词 radio frequency identification(RFID) distance bounding protocol relay attack rapid bit exchange radio frequency identification(RFID) distance bounding protocol relay attack rapid bit exchange
  • 相关文献

参考文献21

  • 1Hancke G, Kuhn M. An RFID Distance Bounding Protocol [C]//The 1st International Conference on Security and Pri- vacy for Emerging Areas in Communications Networks (SECURECOMM'05). Los Alamitos: IEEE Press, 2005: 67-73.
  • 2Brands S, Chaum D. Distance-Bounding protocols [C] // Workshop on the Theory & Application of Cryptographic Techniques on Advances in Cryptology. New York: ACM Press, 1994: 344-359.
  • 3Capkun S, Buttyan L, Hubaux J P. Secure tracking of node encounters in multi-hop wireless networks [C] // Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN'03. New York: ACM Press, 2003: 21-32.
  • 4Waters B, Felten A. Secure, private proofs of location[J]. Princeton Computer Science, 2003,372:134-145.
  • 5Bussard L, Bagga W. Distance-bounding proof of knowledge to avoid real-time attacks[J]. IFIP International Federation for Information Processing, 2005, 181: 223-238.
  • 6Reid J, Nieto J G, Tang T, et al. Detecting relay attacks with timing based protocols [C] // Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM Pesss, 2007: 204-213.
  • 7Piramuthu S. Protocols for RFID tag/reader authentication [J]. Decision Support Systems, 2007,43:897-914.
  • 8Munilla J, Peinado A. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels [EB/OL]. [2015-09-08]. http://onlinelibrary. wiley.com/doi/10.1002/wcm. 509/abstract.jsessionid=D 1F45 773BB669F6EOA9D9A 1A93947F8F.JO2t03.
  • 9Tu Y, Piramuthu S. RFID distance bounding protocols [C]// The 1st International EURASIP Workshop in RFID Tech- nology. Vienna: Springer-Verlag, 2007.
  • 10SingelI Ee D, Preneel B. Distance bounding in noisy envi- ronments [C]//2nd IEEE International Workshop on Engi- neering Semantic Agent Systems 2007. 2007, 4572:101- 115.

二级参考文献24

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Vaudenay S. On privacy models for RFID [G] //LNCS 4833, Proc of ASIACRYPT 2007. Berlin, Springer, 2007, 68-87.
  • 3Conway J. On Numbers and Games [M]. New York: Academic Press. 1976.
  • 4Desmedt Y. Goutier C. Bengio S. Special uses and abuses of the Fiat-Shamir passport protocol [G] //LNCS 0293: Proc of CRYPTO'87. Berlin: Springer. 1987: 21-39.
  • 5Avoine G. Bingol M. Kardas S. et al. A framework for analyzing RFID distance bounding protocols [J]. J ournal of Computer Security-Special Issue on RFID System Security. 2011.19(2): 289-317.
  • 6Kfir Z. Wool A. Picking virtual pockets using relay attacks on contactless smart card systems [C] //Proc of SecureComm 2005. Piscataway. NJ: IEEE. 2005: 47-58.
  • 7Hancke G. A practical relay attack on IS014443 proximity cards [R]. London: University of Cambridge. 2005.
  • 8Francis L. Hancke G. Mayes K. et al. Practical NFC peerto-peer relay attack using mobile phones [G] //LNCS 6370: Proc of RFIDSec'10. Berlin: Springer. 2010: 35-49.
  • 9Rasmussen K. Capkun S. Implications of radio fingerprinting on the security of sensor networks [C] //Proc of SecureComm 2007. Piscataway. NJ: IEEE. 2007: 331-340.
  • 10Hu Y. Perrig A. Johnson D. Packet l.eashes , A defense against wormhole attacks in wireless networks [C] //Proc of INFOCOM 2003. Piscataway. NJ: IEEE. 2003.

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部