Optimal security limits of RFID distance bounding protocols

dc.cclicenceCC-BY-NCen
dc.contributor.authorBingol, Muhammed Ali
dc.contributor.authorKara, O.
dc.contributor.authorKardas, Suleyman
dc.contributor.authorAvoine, Gildas
dc.date.acceptance2010-02-08
dc.date.accessioned2020-07-01T07:45:01Z
dc.date.available2020-07-01T07:45:01Z
dc.date.issued2010-06-08
dc.descriptionThe file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.en
dc.description.abstractIn this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-PCD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security against mafia fraud. We extend the generic attacks to 1-PCD protocols and obtain a trade-off curve for 1-PCD protocols pointing out that 1-PCD protocols can provide better security than CCD protocols. Thereby, we propose a natural extension of a CCD protocol to a 1-PCD protocol in order to improve its security. As a study case, we give two natural extensions of Hancke and Kuhn protocol to show how to enhance the security against either mafia fraud or distance fraud without extra cost.en
dc.exception.ref2021codes252cen
dc.funderNo external funderen
dc.identifier.citationKara, O., Kardaş, S., Bingöl, M.A., Avoine, G. (2010) Optimal Security Limits of RFID Distance Bounding Protocols. In: Ors Yalcin S.B. (Ed.) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, Berlin, Heidelberg: Springer.en
dc.identifier.doihttps://doi.org/10.1007/978-3-642-16822-2_18
dc.identifier.isbn9783642168215
dc.identifier.urihttps://dora.dmu.ac.uk/handle/2086/19885
dc.language.isoenen
dc.peerreviewedYesen
dc.publisherSpringeren
dc.relation.ispartofseriesLecture Notes in Computer Science;6370
dc.researchinstituteCyber Technology Institute (CTI)en
dc.subjectRFIDen
dc.subjectDistance Bounding Protocolen
dc.subjectSecurityen
dc.subjectmafia frauden
dc.subjectdistance frauden
dc.titleOptimal security limits of RFID distance bounding protocolsen
dc.typeConferenceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Optimal_security_limits_of_RFID_DBP.pdf
Size:
447.97 KB
Format:
Adobe Portable Document Format
Description:
Accepted conference manuscript
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: