RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud
详细信息    查看全文
文摘
Distance Bounding (DB) protocol is a lightweight protocol which is used in RFID, NFC and WSN. These protocols enable an entity to determine an upper bound on the physical distance to another entity as well as to authenticate the other entity. This leads to rejection of the requests located out of this distance limitation. So far, many unilateral DB protocols have been proposed to resist mafia and distance fraud attacks. In this paper, we present two unilateral DB protocols. The first one uses predefined delay and two random binary challenges (EBT1) [1] whereas the second protocol uses predefined delay and two different challenges: predefined challenges and random challenges (EBT2). The resistance of these protocols against mafia and distance fraud attacks is better than other unilateral DB protocols. By changing the two random binary challenges into predefined challenge and random challenge, we obtain better resistance to mafia fraud and lower resistance to distance fraud. In addition, the proposed protocols can be applied to passive RFID tags and do not require an extra final signature after the fast bit phase.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700