The Poulidor distance-bounding protocol

35Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-known distance-bounding protocols. These protocols are usually designed to resist to only one of these frauds, though, behave poorly when both are considered. In this paper (i) we extend the analysis of mafia and distance frauds in recently released protocols. (ii) We introduce the concept of distance-bounding protocols based on graphs while previous proposals rely on linear registers or binary trees. (iii) We propose an instance of the graph-based protocol that resists to both mafia and distance frauds without sacrificing memory. To the best of our knowledge, this protocol achieves the best trade-off between these two frauds. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Trujillo-Rasua, R., Martin, B., & Avoine, G. (2010). The Poulidor distance-bounding protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6370 LNCS, pp. 239–257). https://doi.org/10.1007/978-3-642-16822-2_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free