Addressing relay attacks without distance-bounding in RFID tag inclusion/exclusion scenarios

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the widespread adoption and use of RFID tags, a valid scenario is one in which an RFID-tagged object includes several components that each have their own individual RFID tags. Under such a context, each of the components are bound to be included in or excluded from the main object over its lifetime. In order for only the tags that are a part of the main object to be authenticated by the main object, there is a need for a secure protocol that ensures that no other tag has access to the shared secrets among the main object and the component objects. Moreover, there is also a need to address relay attacks by adversaries under such scenarios. Existing authentication protocols address relay attacks through round-trip distance measurements in such inclusion/exclusion scenarios. While this works in principle, distance-bounding approaches are not always reliable. We consider another approach for inclusion/exclusion scenarios and develop a protocol sketch for this context. We also provide related security analysis.

Cite

CITATION STYLE

APA

Piramuthu, S. (2019). Addressing relay attacks without distance-bounding in RFID tag inclusion/exclusion scenarios. In Communications in Computer and Information Science (Vol. 968, pp. 147–156). Springer Verlag. https://doi.org/10.1007/978-981-13-5758-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free