An RFID Distance Bounding Protocol

@article{Hancke2005AnRD,
  title={An RFID Distance Bounding Protocol},
  author={G. Hancke and M. Kuhn},
  journal={First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)},
  year={2005},
  pages={67-73}
}
  • G. Hancke, M. Kuhn
  • Published 2005
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • Radio-frequency identification tokens, such as contactless smartcards, are vulnerable to relay attacks if they are used for proximity authentication. Attackers can circumvent the limited range of the radio channel using transponders that forward exchanged signals over larger distances. Cryptographic distance-bounding protocols that measure accurately the round-trip delay of the radio signal provide a possible countermeasure. They infer an upper bound for the distance between the reader and the… CONTINUE READING
    523 Citations
    Distance-Bounding Protocol with Time-Stamped Authentication for RFID
    • Guo-Heng Wei, Huan-Guo Zhang, Zheng Li
    • Computer Science
    • 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
    • 2014
    RFID Distance Bounding Multistate Enhancement ( Short Version )
    • Highly Influenced
    • PDF
    Attacks on time-of-flight distance bounding channels
    • 95
    • PDF
    RFID Distance Bounding Multistate Enhancement
    • 34
    • Highly Influenced
    Enhanced low-cost RFID protocol to detect relay attacks
    • 15
    Design of a secure distance-bounding channel for RFID
    • G. Hancke
    • Computer Science
    • J. Netw. Comput. Appl.
    • 2011
    • 69
    • PDF
    Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • 44
    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    • 52
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 33 REFERENCES
    Distance-Bounding Protocols (Extended Abstract)
    • 519
    • PDF
    A Practical Relay Attack on ISO 14443 Proximity Cards
    • 189
    • PDF
    An Asymmetric Security Mechanism for Navigation Signals
    • M. Kuhn
    • Computer Science
    • Information Hiding
    • 2004
    • 157
    • PDF
    Enhancing RFID Privacy via Antenna Energy Analysis
    • 42
    • PDF
    Secure verification of location claims
    • 739
    • PDF
    Embedding Distance-Bounding Protocols within Intuitive Interactions
    • 21
    • PDF
    Secure positioning of wireless devices with application to sensor networks
    • Srdjan Capkun, J. Hubaux
    • Computer Science
    • Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
    • 2005
    • 563
    • PDF
    Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing
    • 146
    • PDF
    LOCADIO: inferring motion and location from Wi-Fi signal strengths
    • J. Krumm, E. Horvitz
    • Computer Science
    • The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
    • 2004
    • 256
    • PDF