Filters








1,765 Hits in 1.4 sec

A framework for analyzing RFID distance bounding protocols

Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardaş, Cédric Lauradoux, Benjamin Martin, Yingjiu Li, Jianying Zhou
2011 Journal of Computer Security  
Many distance bounding protocols appropriate for the RFID technology have been proposed recently.  ...  Motivated by this need, we introduce a unified framework that aims to improve analysis and design of distance bounding protocols.  ...  The authors thank to Jorge Munilla and Marc Vauclair for their interesting comments.  ... 
doi:10.3233/jcs-2010-0408 fatcat:fz272dd3ljcnhdwmqvzezjplhm

Guest editors' preface

Yingjiu Li, Jianying Zhou, Yingjiu Li, Jianying Zhou
2011 Journal of Computer Security  
and skimming attacks, from RFID distance-bounding protocols, secure ownership transfer of RFID tags to efficient construction of HB family protocols.  ...  protocols that are suitable for low-cost RFID tags with stringent computational capabilities.  ...  and Benjamin Martin, in "A framework for analyzing RFID distance bounding protocols", provide a unified framework for analyzing distance bounding protocols.  ... 
doi:10.3233/jcs-2010-0405 fatcat:aw25xrdh5nb6joesk7x7l4n4di

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [chapter]

Süleyman Kardaş, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci
2012 Lecture Notes in Computer Science  
Next, we propose a novel RFID distance bounding protocol based on PUFs which satisfies the expected security requirements.  ...  Distance bounding protocols are particularly designed as a countermeasure against these attacks.  ...  Acknowledgment We thank anonymous referees for valuable comments on a previous version of this paper. This work has been partially funded by FP7-Project ICE under the grant agreement number 206546.  ... 
doi:10.1007/978-3-642-25286-0_6 fatcat:d7of7ql3rzbovmlkf4ku5cihby

Author Index Volume 19 (2011)

2011 Journal of Computer Security  
Martin, A framework for analyzing RFID distance bounding protocols (2) 289 -317 Barber, K.S., see DeAngelis, D. (1) 57 -99 Basin, D., see Köpf, B. (1) 1 -31 Bingöl, M.A., see Avoine, G. (2) 289 -317 Biskup  ...  Zhao, A zero-knowledge based framework for RFID privacy (6) 1109 -1146 Dewri, R., I. Ray, I. Ray and D.  ... 
doi:10.3233/jcs-2011-19606 fatcat:sal5w36robf3tfv4zuh5rkcmkm

Distance Bounding: A Practical Security Solution for Real-Time Location Systems

Adnan Abu-Mahfouz, Gerhard P. Hancke
2013 IEEE Transactions on Industrial Informatics  
This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires  ...  Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time  ...  For a more formal analysis framework and extended overview of these protocols, the reader could refer to [20] and [21] . A.  ... 
doi:10.1109/tii.2012.2218252 fatcat:tz6hrgy6hnegritw7tdglc625u

Distance Hijacking Attacks on Distance Bounding Protocols

Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
2012 2012 IEEE Symposium on Security and Privacy  
We extend a formal framework for reasoning about distance bounding protocols to include overshadowing attacks.  ...  We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. This type of attack poses a serious threat in many practical scenarios.  ...  RELATED WORK Distance bounding for RFID tags: Avoine et al. present in [1] a framework for analyzing RFID distance bounding protocols.  ... 
doi:10.1109/sp.2012.17 dblp:conf/sp/CremersRSC12 fatcat:3knlkfskkndzrozn4lgzgf5lx4

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
After analyzing security challenges of RFID networks, different countermeasures that are proposed by other researchers are discussed.  ...  Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  In addition, known security models for RFID including a model in Universal Composable Framework [44] and Vaudenay's model [56] ignore the RFID reader as a party of a RFID system.  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks [article]

Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador
2010 arXiv   pre-print
Distance bounding protocols represent a promising countermeasure to hinder relay attacks.  ...  In 2008, Kim et al. [1] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance.  ...  The Hitomi RFID Distance Bounding Protocol In this section, a new RFID distance bounding protocol is presented.  ... 
arXiv:0906.4618v2 fatcat:o3orzslvy5bqlgdg5gg4qcxkui

Authentication Process between RFID Tag and Mobile Agent Under U-healthcare System

Jung Tae Kim
2014 International Journal of Bio-Science and Bio-Technology  
A variety of security and privacy threats to RFID authentication protocols with embedded healthcare system have been widely studied.  ...  Considering this RFID security issues, we analyzed the security threats and open problems related to these matters.  ...  Reader authentication Encryption the data, shielding the tag or limit the tag-reader distance Using short range tags, shielding the tag or implementing the distance bounding protocol Encryption the data  ... 
doi:10.14257/ijbsbt.2014.6.3.13 fatcat:rvvzd2lfj5eidjbcieoajv3p5q

A secure distance-based RFID identification protocol with an off-line back-end database

Pedro Peris-Lopez, Agustin Orfila, Esther Palomar, Julio C. Hernandez-Castro
2011 Personal and Ubiquitous Computing  
The proposed protocol, called Noent, is based on cryptographic puzzles to avoid the indiscriminate disclose of the confidential information stored on tags and on an innovative role reversal distance bounding  ...  The design of a secure RFID identification scheme is a thought-provoking challenge and this paper deals with this problem adopting a groundbreaking approach.  ...  Acknowledgements Our sincere thanks to the anonymous reviewers for their useful comments which assisted us in the improvement of this article.  ... 
doi:10.1007/s00779-011-0396-y fatcat:jrwpszpi6jhubj2qomy3mzeb7y

Secure EPC Gen2 Compliant Radio Frequency Identification [chapter]

Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009 Lecture Notes in Computer Science  
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry.  ...  In this paper we analyze these protocols and show that they are not secure and subject to replay/impersonation and statistical analysis attacks.  ...  A security framework for RFID RFID deployments A typical RFID deployment involves tags T , Readers R and a back-end Server S.  ... 
doi:10.1007/978-3-642-04383-3_17 fatcat:b5ngvp4ygnf5xpuorw5yw3ihqq

Securing Low-cost RFID Systems: A Research Survey

Qi Chai
2014 International Journal of RFID Security and Cryptography  
primitives/protocols, e.g., compact ASIC cores for 128-bit AES [36]; (2) tailoring well-investigated primitives/protocols to be more hardware-efficient and less computationally demanding, e.g., a lightweight  ...  This paper provides a general overview of the rather broad area of RFID security and privacy and gives the main citations for the comprehensive understanding and further explorations of this area.  ...  Hancke and Kuhn's observed in [49] that the last phase of Brands and Chaum's protocol may not be indispensable, thus proposed the first distance bounding protocol for RFID applications.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0015 fatcat:skq7whrbwffhjf22v6ub672al4

Users Authentication and Privacy control of RFID Card [article]

Ikuesan R. Adeyemi, Norafida Bt. Ithnin
2012 arXiv   pre-print
Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade.  ...  We proposed a conceptual framework that that can be used to mitigate the unauthorized use of RFID Card. This concept will mitigate the single point of the RFID card failure: unauthorized use.  ...  BurrowAbadiNeedham89 (BAN) logic [36] was adopted for this new HMAC-based protocol. RFID distance bounding protocol proposed by [21] can be effective in the defense against relay attack.  ... 
arXiv:1210.1647v1 fatcat:dhpc5arrgrhqznk73kcitgeace

Design and Implementation of a Low-Cost Universal RFID Wireless Logistics Terminal in the Process of Logistics Traceability

Xiaosheng Yu, Zhili Wang, Guolong Shi
2021 Journal of Sensors  
In terms of software, through the research and analysis of the EPC Class-1 Generation-2 protocol standard, the multitag anticollision algorithm—Q algorithm—is adopted.  ...  This algorithm has the advantages of high recognition efficiency and a large number of successfully recognized tags per unit time.  ...  Therefore, this protocol is completely unsuitable for low-cost RFID systems. Low-Cost Universal RFID Framework and Protocol in the Logistics Wireless Network Environment 3.1.  ... 
doi:10.1155/2021/9755258 fatcat:zcn2vqb7fnbjdmueswyba5ufpa

Security Analysis of two Distance-Bounding Protocols [article]

Mohammad Reza Sohizadeh Abyaneh
2012 arXiv   pre-print
In this paper, we analyze the security of two recently proposed distance bounding protocols called the Hitomi and the NUS protocols.  ...  Namely, we show that the Hitomi protocol is susceptible to a full secret key disclosure attack which not only results in violating the privacy of the protocol but also can be exploited for further attacks  ...  Conclusions The design of a secure distance bounding protocol which can resist against the existing attacks for RFID systems is still challenging.  ... 
arXiv:1107.3047v2 fatcat:2onetmq6ifholcuqtlwlrxxjqy
« Previous Showing results 1 — 15 out of 1,765 results