Skip to main content

Distance Bounding Protocol for RFID Systems

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9798))

  • 1577 Accesses

Abstract

A secure mutual distance bounding (SMDB) protocol has been proposed, which employs a combination of slow exchange, bit complement rapid exchange rule and final signature verification mechanisms to guarantee the secure authentication while dramatically reduce success probability of mafia fraud and impersonation attacks. Meanwhile, a particular identifier updating method is introduced to keep the consistency of identifiers between the reader and the database. A comprehensive probabilistic analysis on security properties proves that the proposed SMDB protocol provides ideal resistance against mafia fraud, terrorist fraud and distance fraud attacks.

J. Zhou—This work was supported in part by the fundamental research funds for the central universities (3122013C004), the National Natural Science Foundation of China (61303232), the China Scholarship Council (201406475025), and the National High Technology Research and Development Program(‘863’ Program) of China (2015AA017201).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jannati, H.: Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. Int. J. Criti. Infrastruct. Protect. 11, 51–61 (2015)

    Article  Google Scholar 

  2. Guizani, S.: Security analysis of RFID relay attacks. J. Int. Technol. 17(2), 191–196 (2016)

    Google Scholar 

  3. Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  4. Cremers, C., Rasmussen, K., Capkun, S.: Distance hijiacking attacks on distance bounding protocols. In: Cryptology ePrint Archive: Report 2011/129 (2011)

    Google Scholar 

  5. Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98–115. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119–133. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Xin, W., Sun, H.P., Chen, Z.: Analysis and design of distance-bounding protocols for RFID. J. Comput. Res. Dev. 50(11), 2358–2366 (2013)

    Google Scholar 

  8. Dowon, H.: Authenticated distance bounding protocol with improved FAR: beyond the minimal bound of FAR. IEICE Trans. Commun. 97(5), 930–935 (2014)

    Google Scholar 

  9. Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing based protocols. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, New York, USA, pp. 204–213 (2007)

    Google Scholar 

  10. Pedro, P.L., Castro, J.H., Tapiador, J., Palomar, E., Lubbe, J.V.: Cryptographic puzzles and distance bounding protocols: Practical tools for RFID security. In: 2010 IEEE International Conference on RFID, Orlando, pp. 45–52 (2010)

    Google Scholar 

  11. Avoine, G., Bingol, M.A., Kardas, S., Lauradoux, C., Martin, B.: A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols. Cryptology ePrint Archive, Report 2009/543 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingxian Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhou, Y., Zhou, J. (2016). Distance Bounding Protocol for RFID Systems. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42836-9_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42835-2

  • Online ISBN: 978-3-319-42836-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics