Chaotic masking for securing RFID systems against relay attacks

被引:4
|
作者
Malek, Behzad [1 ]
Miri, Ali [2 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
[2] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
RFID authentication; security; relay attack; chaotic system; Lorenz; chaos suppression; ACTIVE CONTROL; COMMUNICATION; SYNCHRONIZATION; CHALLENGES; PROTOCOL;
D O I
10.1002/sec.586
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relay attack is a simple yet effective attack against most radio-frequency identification (RFID) authentication systems. Because of the minimalist design of an RFID system, a lightweight authentication scheme must be designed to provide a strong level of security for low-cost RFID tags. In this work, we propose a simple but secure masking scheme that counters the relay attack in RFID systems. Our scheme is the first solution based on the chaos suppression theory. We have exploited the chaotic characteristics of a dynamic Lorenz controller to distinguish a legitimate RFID reader from a proxy reader in the relay attack. We also show that the proposed approach is practical using simulation results. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1496 / 1508
页数:13
相关论文
共 50 条
  • [1] Analysis of Relay Attacks on RFiD Systems
    Lima, J. A.
    Miri, A.
    Nevins, M.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1274 - 1282
  • [2] Chaotic Radio Frequency Fingerprint Masking Against Identity Attacks
    Li, Mingye
    Peng, Xinyong
    Chai, Zhi
    Huang, Xinran
    Huang, Renhui
    Qiu, Yilin
    Yang, Xuelin
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (09) : 2616 - 2619
  • [3] Research on Defense Technology of Relay Attacks in RFID systems
    Shen, Weiwei
    Xu, He
    Sun, Rui
    Wang, Ruchuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 18 - 22
  • [4] On Detecting Relay Attacks on RFID Systems Using Qubits
    Abidin, Aysajan
    CRYPTOGRAPHY, 2020, 4 (02) : 1 - 12
  • [5] A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
    Ma, Di
    Saxena, Nitesh
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2684 - 2695
  • [6] Securing Malware Cognitive Systems against Adversarial Attacks
    Ti, Yuede
    Bowman, Benjamin
    Huang, H. Howie
    2019 IEEE INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (IEEE ICCC 2019), 2019, : 1 - 9
  • [7] Securing Multiagent Systems Against a Sequence of Intruder Attacks
    Abbas, Waseem
    Egerstedt, Magnus
    2012 AMERICAN CONTROL CONFERENCE (ACC), 2012, : 4161 - 4166
  • [8] Securing Iris Recognition Systems Against Masquerade Attacks
    Galbally, Javier
    Gomez-Barrero, Marta
    Ross, Arun
    Fierrez, Julian
    Ortega-Garcia, Javier
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION X, 2013, 8712
  • [9] Security Analysis of RFID Relay Attacks
    Guizani, Sghaier
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 191 - 196
  • [10] Detecting relay attacks on RFID communication systems using quantum bits
    Hoda Jannati
    Ebrahim Ardeshir-Larijani
    Quantum Information Processing, 2016, 15 : 4759 - 4771