Loading...

A mafia and distance fraud high-resistance RFID distance bounding protocol

Entezari, R ; Sharif University of Technology

262 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2014.6994024
  3. Abstract:
  4. A practical approach to prevent location-based attacks in RFID systems is the use of Distance Bounding (DB) protocols. These protocols enable an entity to determine an upper bound on the physical distance to another entity as well as to authenticate it. It makes, rejection of the requests located out of this distance limitation. So far, many DB protocols have been designed with the aim of resistance to location-based attacks. In this paper, we propose a unilateral DB protocol using delay concept while sending two random binary challenges. This protocol can resist better than other unilateral DB protocols against mafia and distance fraud attacks. In addition, the proposed protocol can be applied to passive RFID tags
  5. Keywords:
  6. Authentication ; Distance Bounding Protocol ; Distance Fraud ; Mafia Fraud ; RFID
  7. Source: International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 18 December 2014 , Pages 67-72
  8. URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-84921025657&partnerID=40&md5=607b6d50982dea35f38bd87e84e5e67c