Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of exist...Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags.展开更多
Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-resp...Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness.展开更多
基金Supported by the Natural Science Foundation of China(6097011561003268)
文摘Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags.
基金Supported by the National Natural Science Foundation of China(61332019)
文摘Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness.