With the widespread adoption and use of RFID tags, a valid scenario is one in which an RFID-tagged object includes several components that each have their own individual RFID tags. Under such a context, each of the components are bound to be included in or excluded from the main object over its lifetime. In order for only the tags that are a part of the main object to be authenticated by the main object, there is a need for a secure protocol that ensures that no other tag has access to the shared secrets among the main object and the component objects. Moreover, there is also a need to address relay attacks by adversaries under such scenarios. Existing authentication protocols address relay attacks through round-trip distance measurements in such inclusion/exclusion scenarios. While this works in principle, distance-bounding approaches are not always reliable. We consider another approach for inclusion/exclusion scenarios and develop a protocol sketch for this context. We also provide related security analysis.
CITATION STYLE
Piramuthu, S. (2019). Addressing relay attacks without distance-bounding in RFID tag inclusion/exclusion scenarios. In Communications in Computer and Information Science (Vol. 968, pp. 147–156). Springer Verlag. https://doi.org/10.1007/978-981-13-5758-9_13
Mendeley helps you to discover research relevant for your work.