文摘
Distance Bounding (DB) protocol is a lightweight protocol which is used in RFID, NFC and WSN. These protocols enable an entity to determine an upper bound on the physical distance to another entity as well as to authenticate the other entity. This leads to rejection of the requests located out of this distance limitation. So far, many unilateral DB protocols have been proposed to resist mafia and distance fraud attacks. In this paper, we present two unilateral DB protocols. The first one uses predefined delay and two random binary challenges (EBT1) [1] whereas the second protocol uses predefined delay and two different challenges: predefined challenges and random challenges (EBT2). The resistance of these protocols against mafia and distance fraud attacks is better than other unilateral DB protocols. By changing the two random binary challenges into predefined challenge and random challenge, we obtain better resistance to mafia fraud and lower resistance to distance fraud. In addition, the proposed protocols can be applied to passive RFID tags and do not require an extra final signature after the fast bit phase.