An efficient RFID distance bounding protocol

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

RFID System is vulnerable for man-in-the-middle attack. Distance bounding protocols are designed for authentication while taking into consideration the distance measure. Distance bounding protocols solve the problem of man-in-the-middle attack in practical. In the known protocols from public literatures, the mafia fraud probability is usually very high, or the memory requirement is large. In this paper, we propose an efficient distance bounding protocol, which uses a single bit to challenge, and it does not require the final signature as many existing such protocols do. The protocol uses a linear memory and has a good probability in resisting against mafia fraud attack.

Cite

CITATION STYLE

APA

Zhai, L., & Wu, C. K. (2015). An efficient RFID distance bounding protocol. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 367–376). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free