Font Size: a A A

The Research Of RFID Distance Bounding Protocol

Posted on:2015-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:J H WangFull Text:PDF
GTID:2268330428968553Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the the trend of information globalization, the application of radio frequency identification (RFID) technology continues to extend in the following years. It brings to the fact that the RFID system reveals itself more and more security issue. Specially, The RFID systems easily suffer from some location-based attacks. Such attacks can be divided into two categories:Relay attacks and distance fraud. Relay attack consists of mafia fraud and terrorist attacks. Among them, the favored means by an adversary is mafia fraud. In order to achieve the aim of attack, an adversary relays the communication message between the honest reader and tag by placing the fraudulent tag and reader, so the honest parties mistakenly assume that each other is nearby. It is hard to prevent this attack in the RFID system who has the limits of computational capacity and insufficient memory, since this attack can be mounted without tampering of message between the honest reader and tag.Recently, The best way to solve these attacks is the distance-bounding technology whose concept is that measuring the communication message’s round-trip time of between the reader and tag, since the fact is that the message propagation speed equals to the speed of light. On the basis of the concept, researchers have proposed some distance-bounding protocols. These protocols play a key role in preventing this attack, but they are also defective.In this paper, we propose a security-enhancing distance-bounding protocol,SES protocol for short, which can be used in RFID system. In addition to the basic functionality, The SES protocol also has two exceptions. That, firstly, in the rapid exchange phase of the protocol, a4-state coding rule is used in sending2-bits challenge that greatly reduces the adversary success probability and improves efficiency by reducing the round at the same level of security; secondly, we introduce a secure method sending the random number which makes the tag don’t participate in the random number generation process so that the protocol is more suitable for the low-cost RFID system, and that enhances the security of the protocol. It proves that our new distance-bounding protocol can resist terrorist attacks that can’t be resolved by the previous distance-bounding protocol, and improves its anti-attack capability.
Keywords/Search Tags:RFID, relay attack, distance bounding protocol
PDF Full Text Request
Related items