Optimal Security Limits of RFID Distance Bounding Protocols

被引:0
|
作者
Kara, Orhun [1 ]
Kardas, Suleyman [1 ,2 ]
Bingol, Muhammed Ali [1 ,3 ]
Avoine, Gildas [4 ]
机构
[1] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[2] Sabanci Univ, TR-34956 Istanbul, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] UCL, Informat Secur Grp, Louvain, Belgium
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES | 2010年 / 6370卷
关键词
RFID; distance bounding protocol; security; mafia fraud; distance fraud; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-POD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [31] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [32] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
  • [33] Security of RFID Protocols - A Case Study
    van Deursen, Ton
    Radomirovic, Sasa
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 : 41 - 52
  • [34] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [35] Critical Evaluation of RFID Security Protocols
    Zavvari, Azam
    Patel, Ahmed
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (03) : 56 - 74
  • [36] A Critical Analysis of RFID Security Protocols
    Sharif, Atif
    Potdar, Vidyasagar
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
  • [37] Desynchronization attacks on RFID security protocols
    Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [38] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [39] On the Security of RFID Group Scanning Protocols
    Dang, Duc Nguyen
    Kim, Kwangjo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
  • [40] Key establishment using secure distance bounding protocols
    Singelee, Dave
    Preneel, Bart
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521