• DocumentCode
    246997
  • Title

    Distance-Bounding Protocol with Time-Stamped Authentication for RFID

  • Author

    Wei Guo-Heng ; Zhang Huan-Guo ; Li Zheng

  • Author_Institution
    Sch. of Comput., Wuhan Univ., Wuhan, China
  • fYear
    2014
  • fDate
    8-10 Nov. 2014
  • Firstpage
    139
  • Lastpage
    145
  • Abstract
    Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
  • Keywords
    cryptographic protocols; radiofrequency identification; relay networks (telecommunication); telecommunication security; RFID; challenge-response authentication protocols; distance-bounding protocol; radiofrequency identification; rapid bit exchange phase; relay attack; spoofing attacks; time-stamped authentication; time-stamped program; Authentication; Clocks; Protocols; Radiofrequency identification; Relays; Terrorism; Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on
  • Conference_Location
    Guangdong
  • Type

    conf

  • DOI
    10.1109/3PGCIC.2014.47
  • Filename
    7024570