An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks 


Vol. 35,  No. 4, pp. 610-619, Apr.  2010


PDF
  Abstract

RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from malicious attackers. For that reason, Brands, et al. proposed a certification protocol between a certifier and a verifier based on the concept of distance-bounding, and in addition Hancke et al. introduced the concept of RFID. However, the delivery of tag IDs, one of the main RFID features, is not still available, and there are two important demerits: anonymity in the delivery of tag IDs suggested by Kim et al. and inefficiency in finding a tag ID with regard to how to check errors which may occur in the process of data exchange between readers and tags. Therefore, this study proposes a protocol that meets the requirements of tag anonymity and location untraceability, has resistance to errors which may take place in the phase of tag data exchange, and is very efficient in finding tag IDs.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

C. Boo and M. Jun, "An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 4, pp. 610-619, 2010. DOI: .

[ACM Style]

Chang-hee Boo and Moon-seog Jun. 2010. An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks. The Journal of Korean Institute of Communications and Information Sciences, 35, 4, (2010), 610-619. DOI: .

[KICS Style]

Chang-hee Boo and Moon-seog Jun, "An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 4, pp. 610-619, 4. 2010.