Distance Bounding Protocol for Multiple RFID Tag Authentication

@article{Kapoor2008DistanceBP,
  title={Distance Bounding Protocol for Multiple RFID Tag Authentication},
  author={Gaurav Kapoor and Wei Zhou and Selwyn Piramuthu},
  journal={2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing},
  year={2008},
  volume={2},
  pages={115-120}
}
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple tags are authenticated for their simultaneous presence in the field of the reader… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

References

Publications referenced by this paper.
Showing 1-8 of 8 references

An RFID Distance Bounding Protocol

First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) • 2005
View 6 Excerpts
Highly Influenced

The BlueSniper ‘rifle,

J. Hering
DEFCON, Las Vegas • 2004
View 1 Excerpt
Highly Influenced

Distance Bounding Protocols on TH-UWB Radios

2010 IEEE Global Telecommunications Conference GLOBECOM 2010 • 2010
View 1 Excerpt

How to Build a Low-Cost, Extended-Range RFID Skimmer

IACR Cryptology ePrint Archive • 2006
View 1 Excerpt

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) • 2005
View 1 Excerpt

Major Security Problems with the ‘Unforgeable’ (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them

Y. Desmedt
Proceedings of the Securicom 88, 6 Worldwide Congress on Computer and Communications Security and Protection, pp. 147-159 (1988). • 1988
View 1 Excerpt

Similar Papers

Loading similar papers…