Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

被引:31
|
作者
Urien, Pascal [1 ]
Piramuthu, Selwyn [2 ,3 ]
机构
[1] TELECOM ParisTech, INFRES, F-75013 Paris, France
[2] Univ Florida, Gainesville, FL 32611 USA
[3] RFID European Lab, Paris, France
关键词
RFID; Mutual authentication; Distance bounding protocol; Relay attack; DISTANCE BOUNDING PROTOCOL; IDENTIFICATION;
D O I
10.1016/j.dss.2013.10.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unless specifically designed for its prevention, none of the existing RFID authentication protocols are immune to relay attacks. Relay attacks generally involve the presence of one or more adversaries who transfer unmodified messages between a prover and a verifier. Given that the message content is not modified, it is rather difficult to address relay attacks through cryptographic means. Extant attempts to prevent relay attacks involve measuring signal strength, round-trip distance, and ambient conditions in the vicinity of prover and verifier. While a majority of related authentication protocols are based on measuring the round-trip distance between prover and verifier using several single-bit challenge-response pairs, recent discussions include physical proximity verification using ambient conditions to address relay attacks. We provide an overview of existing literature on addressing relay attacks through ambient condition measurements. We then propose an elliptic curve-based mutual authentication protocol that addresses relay attacks based on (a) the surface temperature of the prover as measured by prover and verifier and (b) measured single-bit round-trip times between prover and verifier. We also evaluate the security properties of the proposed authentication protocol. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:28 / 36
页数:9
相关论文
共 50 条
  • [1] An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 198 - 206
  • [2] A Secure Elliptic Curve-Based RFID Protocol
    Santi Martínez
    Magda Valls
    Concepció Roig
    Josep M. Miret
    Francesc Giné
    Journal of Computer Science and Technology, 2009, 24 : 309 - 318
  • [3] A Secure Elliptic Curve-Based RFID Protocol
    Santi Martínez
    Magda Valls
    Concepció Roig
    Josep M. Miret
    Francesc Giné
    JournalofComputerScience&Technology, 2009, 24 (02) : 309 - 318
  • [4] A Secure Elliptic Curve-Based RFID Protocol
    Martinez, Santi
    Valls, Magda
    Roig, Concepcio
    Miret, Josep M.
    Gine, Francesc
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, 24 (02) : 309 - 318
  • [5] Vulnerability Analysis of Elliptic Curve-Based RFID Protocol
    Lv Chao
    Li Hui
    Ma Jianfeng
    Niu Ben
    CHINA COMMUNICATIONS, 2011, 8 (04) : 153 - 158
  • [6] On addressing RFID/NFC-based relay attacks: An overview
    Tu, Yu-Ju
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2020, 129
  • [7] Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    SENSORS, 2023, 23 (03)
  • [8] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [9] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [10] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,