Browse > Article
http://dx.doi.org/10.7840/kics.2016.41.3.298

RFID Distance Bounding Protocol to Secure Against Relay Attack by Using Full-Response  

Kwon, Hye Jin (College of IT Engineering, Kyungpook National University)
Kim, Soon Ja (College of IT Engineering, Kyungpook National University)
Abstract
We propose a RFID distance bounding protocol that RFID tag still responds when reader sends a void challenge in order to reduce the probability of a relay attack. We analyze the success probability of relay attack depending on the full challenge ratio. Our experimental results show that our protocol is secure to relay attack.
Keywords
RFID authentication; distance bounding protocol; mafia fraud; relay attack; impersonation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. P. Hancke and M. G. Kuhn, "An RFID distance bounding protocol," in 1st Int. Conf. Security and Privacy for Emerging Areas in Commun. Netw. (SecureComm 2005), pp. 67-73, Sept. 2005.
2 J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void challenges and analysis in noisy channels," Wirel. Commun. Mob. Comput., vol. 8, no. 9, pp. 1227-1232, 2008.   DOI