DocumentCode :
246997
Title :
Distance-Bounding Protocol with Time-Stamped Authentication for RFID
Author :
Wei Guo-Heng ; Zhang Huan-Guo ; Li Zheng
Author_Institution :
Sch. of Comput., Wuhan Univ., Wuhan, China
fYear :
2014
fDate :
8-10 Nov. 2014
Firstpage :
139
Lastpage :
145
Abstract :
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
Keywords :
cryptographic protocols; radiofrequency identification; relay networks (telecommunication); telecommunication security; RFID; challenge-response authentication protocols; distance-bounding protocol; radiofrequency identification; rapid bit exchange phase; relay attack; spoofing attacks; time-stamped authentication; time-stamped program; Authentication; Clocks; Protocols; Radiofrequency identification; Relays; Terrorism; Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on
Conference_Location :
Guangdong
Type :
conf
DOI :
10.1109/3PGCIC.2014.47
Filename :
7024570
Link To Document :
بازگشت