Skip to main content

An Efficient RFID Distance Bounding Protocol

  • Conference paper
  • First Online:
Book cover International Joint Conference (CISIS 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

RFID System is vulnerable for man-in-the-middle attack. Distance bounding protocols are designed for authentication while taking into consideration the distance measure. Distance bounding protocols solve the problem of man-in-the-middle attack in practical. In the known protocols from public literatures, the mafia fraud probability is usually very high, or the memory requirement is large. In this paper, we propose an efficient distance bounding protocol, which uses a single bit to challenge, and it does not require the final signature as many existing such protocols do. The protocol uses a linear memory and has a good probability in resisting against mafia fraud attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Desmedt, Y.: Major security problems with the unforgeable(feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, vol. 88, pp. 15–17 (1988)

    Google Scholar 

  2. Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21–39. Springer, Heidelberg (1988)

    Google Scholar 

  3. Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.J.: Secure implementation of identification systems. J. Cryptol. 4(3), 175–183 (1991)

    Article  Google Scholar 

  4. Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Google Scholar 

  5. Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks. SecureComm 2005, pp. 67–73. IEEE (2005)

    Google Scholar 

  6. Munilla, J., Peinado, A.: Distance bounding protocols for rfid enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput. 8(9), 1227–1232 (2008)

    Article  Google Scholar 

  7. Avoine, G., Floerkemeier, C., Martin, B.: RFID distance bounding multistate enhancement. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 290–307. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Zhuang, Y., Yang, A., Wong, D.S., Yang, G., Xie, Q.: A highly efficient RFID distance bounding protocol without real-time PRF evaluation. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 451–464. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  9. Kim, C.H., Avoine, G.: RFID distance bounding protocols with mixed challenges. IEEE Trans. Wirel. Commun. 10(5), 1618–1626 (2011)

    Article  Google Scholar 

  10. Jannati, H., Falahati, A.: Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks. Wirel. Pers. Commun. 1–23 (2013)

    Google Scholar 

  11. Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250–261. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Avoine, G., Bingl, M.A., Karda, S., Lauradoux, C., Martin, B.: A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2), 289–317 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Zhai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhai, L., Wu, C. (2015). An Efficient RFID Distance Bounding Protocol. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics