Optimal Security Limits of RFID Distance Bounding Protocols

被引:0
|
作者
Kara, Orhun [1 ]
Kardas, Suleyman [1 ,2 ]
Bingol, Muhammed Ali [1 ,3 ]
Avoine, Gildas [4 ]
机构
[1] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[2] Sabanci Univ, TR-34956 Istanbul, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] UCL, Informat Secur Grp, Louvain, Belgium
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES | 2010年 / 6370卷
关键词
RFID; distance bounding protocol; security; mafia fraud; distance fraud; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-POD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [41] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
  • [42] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [43] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [44] Bounding messages for free in security protocols - extension to various security properties
    Arapinis, Myrto
    Duflot, Marie
    INFORMATION AND COMPUTATION, 2014, 239 : 182 - 215
  • [45] Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
    Jannati, Hoda
    Falahati, Abolfazl
    INFORMATION PROCESSING LETTERS, 2015, 115 (6-8) : 623 - 629
  • [46] A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol
    Entezari, Rahim
    Bahramgiri, Hossein
    Tajamolian, Mahnaz
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 67 - 72
  • [47] A Class of Precomputation-based Distance-bounding Protocols
    Mauw, Sjouke
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 97 - 111
  • [48] On Modeling Terrorist Frauds Addressing Collusion in Distance Bounding Protocols
    Vaudenay, Serge
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 1 - 20
  • [49] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [50] Secure Positioning with Non-Ideal Distance Bounding Protocols
    Perazzo, Pericle
    Dini, Gianluca
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 907 - 912