Loading...

Distance Bounding Authentication Protocols in RFID Systems

Babvey, Pouria | 2014

882 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 45845 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Eghlidos, Taraneh
  7. Abstract:
  8. Ever-encreasing progress in the field of wireless communication has paved the way for utilisation based on radio frequency authentication systems. In recent years, ITU started the scenario of "Internet of Things". RFID systems have an exclusive role in development ofthis idea, since they can make it possible for things which have an ID to be identified automatically in a large scale. The necessity of identification and tracing people and things has caused the deployment of RFID technology. Onthe other hand, these systems communicate via a wireless channel to transmit data, therefore they are vulnerable to eavesdropping and interception. Thus, one of the most important issues in using such systemsis to provide them with enough security. Since the RFID tags have very constrained storage and processing power, the lightweight protocols are used in order to make them secure. Lastly, a wide range of lightweight protocols have been introduced to provide RFID systems with security as well as increasing their efficiency. One of the most important challenges to the protocols designed for utilising in these systems is the ability of tackling relay attacks. However to the best of our knowledge none of these protocols don't have sufficient security to reley attacks. Hence, distance bounding authentication protocols have been offered a practical solution to resist against these attacks.
    In this study, after reviewing some aspects of RFID systems, such as security issues, we analyse distance bounding authentication protocols. Then we show that how the usage of pseudorandom functions leads to decline the security of these protocols. Based on possibe existence of a trapdoor in such protocols, we introduce some attacks on the underlying protocols. Lastly, we represent a modified protocol that has more resistance to relay attacks in camparison to the previous protocols
  9. Keywords:
  10. Label ; Privacy ; Radio Frequency Identification (RFID) ; Radio Frequency Identification (RFID) Reader ; Radio Frequency Identification (RFID)Tags ; Distance Bounding Authentication Protocol ; Relay Attacks

 Digital Object List

 Bookmark