Browse > Article
http://dx.doi.org/10.9723/jksiis.2012.17.3.019

RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response  

Jeon, Il-Soo (금오공과대학교 전자공학부)
Yoon, Eun-Jun (경일대학교 사이버보안학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.17, no.3, 2012 , pp. 19-26 More about this Journal
Abstract
To resist the relay attacks in RFID system, it is commonly used RFID distance bounding protocols using the round trip time measurement for 1 bit challenge and response between a reader and a tag. If the success probability of relay attacks for the 1 bit challenge and response can be reduced in these protocols, it is possible to make an efficient distance bounding protocol. In this paper, we propose an efficient RFID distance bounding protocol based on 2 bit challenge and response which is modified the RFID distance bounding protocol proposed by Hancke and Khun based on 1 bit challenge and response. The success probability of relay attack for the proposed protocol is (7/16)n for the n times of challenge and response, which is much lower than (3/4)n given by Hancke and Khun's protocol.
Keywords
RFID; Relay Attack; Distance Bounding Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Brands and D. Chaum, "Distance-Bounding Protocols", Advances in Cryptology, EUROCRYPT'93", Vol. 765 of LNCS, pp. 344-359, 1993.
2 G. Hancke and M. Kuhn, "An RFID Distance Bounding Protocol", Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05) pp. 67-73, 2005.
3 D. Singel'ee and B. Preneel, "Distance Bounding in Noisy Environments", European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'07), Vol. 4572 of LNCS, pp. 101-115, 2007.
4 Y.-J. Tu and S. Piramuthu, "RFID Distance Bounding Protocols", First International EURASIP Workshop on RFID Technology, 2007.
5 J. Munilla, A. Ortiz, and A. Peinado, "Distance Bounding Protocols with Void-Challenges for RFID", Workshop on RFID Security(RFIDSec'06), 2006.
6 J. Munilla and A. Peinado. "Distance bounding protocols for RFID enhanced by using voidchallenges and analysis in noisy channels", Wireless Communications and Mobile Computing, Vol. 8, No. 9, pp. 1227-1232, 2008.   DOI
7 A. O. Gurel, A. Arslan, and M. Akgun, "Nonuniform stepping approach to RFID distance bounding problem", 5th International Workshop on Data Privacy Management(DPM'10), Vol. 6370 of LNCS, 2010.
8 M. R. S. Abyaneh, "Security analysis of two distance-bounding protocols", RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy, pp. 94-107, 2011.
9 C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks", http://eprint.iacr.org/2009/310, 2009.
10 P. Peris-Lopez, J. C. Hernandez- Castro, J. M. Estevez-Tapiador, and J. C. A. vander Lubbe. "Shedding Light on RFID Distance Bounding Protocols and Terrorist Attacks", arXiv.org, Computer Science, Cryptography and Security, 2010.
11 V. Nikov and M. Vauclair, "Yet another secure Distance-bounding Protocol", http://eprint.iacr.org/ 2008/319, 2008.