Abstract
Among the RFID distance bounding protocols in the literature, besides defending against various attacks such as impersonation, distance fraud, Mafia attack, terrorist attack, and distance hijacking, some also support mutual authentication and tag privacy protection. Due to the requirements of being lightweight, low-cost, and efficient, it is the common objective to design new RFID distance bounding protocols which require fewer message flows and less complex cryptographic operations, while maintaining or enhancing the security and privacy of the protocols. In this paper, we propose a new RFID distance bounding protocol which achieves mutual authentication, supports the untraceability of the tags, and resists all the attacks above by having only one slow transmission phase, and is more efficient and energy-saving when compared with other protocols’ two slow phases. The new protocol requires the tag to evaluate a PRF function for two times only, rather than three times as in one of the most efficient mutually authenticated RFID distance bounding protocols currently available, for example, the Swiss-Knife protocol.
Chapter PDF
Similar content being viewed by others
References
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 67–73. IEEE Computer Society (2005)
Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. In: Wireless Communications and Mobile Computing, vol. 8, pp. 1227–1232. Wiley Interscience, Hoboken (2008)
Tu, Y.J., Piramuthu, S.: RFID Distance Bounding Protocols. In: 1st International EURASIP Workshop in RFID Technology, Vienna, Austria (2007)
Reid, J., Nieto, J.G., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-Based Protocols. In: Proc. of the 2nd ACM Symposium on Information, Computer, and Communications Security - ASIACCS 2007, pp. 204–213. ACM, New York (2007)
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98–115. Springer, Heidelberg (2009)
Kim, C.H., Avoine, G.: RFID Distance Bounding Protocols with Mixed Challenges. IEEE Trans. on Wireless Communications 10(5), 1618–1626 (2011)
Avoine, G., Lauradoux, C., Marin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: Proc. of the 4th ACM Conference on Wireless Network Security - WiSec 2011, pp. 145–156 (2011)
Desmedt, Y.: Major security problems with the ’unforgeable’ (Feige)- Fiat- Shamir proofs of identify and how to overcome them. In: SecuriCom 1988, 6th Worldwide Congress on Computer and Communications Security and Protection, SEDEP Paris, pp. 15–17 (1988)
Cremers, C., Rasmussen, K.B., Capkun, S.: Distance Hijacking Attacks on Distance Bounding Protocols. In: IEEE Symposium on Security and Privacy- S&P 2012, pp. 113–127. IEEE Computer Society, Los Alamitos (2012)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 8th ACM Conference on Computer and Communications Security -CCS 2003, pp. 103–111. ACM (2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: International Conference on Security in Pervasive Computing -SPC 2003, pp. 201–212 (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ”Privacy-Friendly” Tags. In: RFID Privacy Workshop (2003)
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (2004)
Paise, R., Vaudenay, S.: Mutual Authentication in RFID: Security and Privacy. In: ACM Symposium on Information, Computer and Communications Security – ASSIACCS 2008, pp. 292–299. ACM (2008)
Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. on Information and System Security 13(1) (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, A., Zhuang, Y., Wong, D.S. (2012). An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy. In: Chim, T.W., Yuen, T.H. (eds) Information and Communications Security. ICICS 2012. Lecture Notes in Computer Science, vol 7618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34129-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-34129-8_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34128-1
Online ISBN: 978-3-642-34129-8
eBook Packages: Computer ScienceComputer Science (R0)