Optimal Security Limits of RFID Distance Bounding Protocols

被引:0
|
作者
Kara, Orhun [1 ]
Kardas, Suleyman [1 ,2 ]
Bingol, Muhammed Ali [1 ,3 ]
Avoine, Gildas [4 ]
机构
[1] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[2] Sabanci Univ, TR-34956 Istanbul, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] UCL, Informat Secur Grp, Louvain, Belgium
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES | 2010年 / 6370卷
关键词
RFID; distance bounding protocol; security; mafia fraud; distance fraud; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-POD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [21] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159
  • [22] Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    Munilla, Jorge
    Peinado, Alberto
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (09): : 1227 - 1232
  • [23] Bounding messages for free in security protocols
    Arapinis, Myrto
    Duflot, Marie
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 376 - 387
  • [24] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [25] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94
  • [26] A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID
    WEI Guoheng
    ZHANG Huanguo
    WANG Ya
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (01) : 37 - 46
  • [27] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [28] The outer limits of RFID security
    Juels, Ari
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 231 - 231
  • [29] The Swiss-Knife RFID Distance Bounding Protocol
    Kim, Chong Hee
    Avoine, Gildas
    Koeune, Francois
    Standaert, Francois-Xavier
    Pereira, Olivier
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 98 - 115
  • [30] Distance Bounding Protocol for Multiple RFID Tag Authentication
    Kapoor, Gaurav
    Zhou, Wei
    Piramuthu, Selwyn
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120