Solution of a Conjecture: On 2-PCD RFID Distance Bounding Protocols
dc.cclicence | CC-BY-NC | en |
dc.contributor.author | Bingol, Muhammed Ali | |
dc.contributor.author | Kardas, Suleyman | |
dc.contributor.author | Kocaaga, Eren | |
dc.contributor.author | Tanil, Bunyamin | |
dc.date.acceptance | 2013-08 | |
dc.date.accessioned | 2020-07-01T08:03:23Z | |
dc.date.available | 2020-07-01T08:03:23Z | |
dc.date.issued | 2013-11-27 | |
dc.description | The file attached to this record is the author's final peer reviewed version. | en |
dc.description.abstract | It is a popular challenge to design distance bounding protocols that are both secure and efficient. Motivated by this, many distance bounding protocols against relay attacks have been advanced in recent times. Another interesting question is whether these protocols provides the best security. In 2010, Kara et al. analysis the optimal security limits of low-cost distance bounding protocols having bit-wise fast phases and no final signature. As for the classification, they have introduced the notion of k-previous challenge dependent (k-PCD) protocols where each response bit depends on the current and the k previous challenges. They have given the theoretical security bounds for two specific classes k = 0 and 1, but have left the security bounds for k >= 2 as an open problem. In this paper, we aim to answer the open question concerning the security limits of 2-PCD protocols. We describe two generic attacks for mafia and distance frauds that can be applied on any 2-PCD protocols. Then, we provide the optimal trade-off curve between the security levels of mafia and distance frauds that determines the security limits of 2-PCD protocols. Finally our results also prove the conjecture that 2-PCD protocols enhance the security compared to 0-PCD and 1-PCD cases. | en |
dc.exception.ref2021codes | 252c | en |
dc.funder | No external funder | en |
dc.identifier.citation | Kocaaga, E., Tanil, B., Bingol, M.A., Kardas, S. (2013) Solution of a Conjecture: On 2-PCD RFID Distance Bounding Protocols. In: Lee, D.H. and Lim, J.I. (Eds.) 6th International Information Security & Cryptology Conference, Korea, November 2003, Heidelberg: Springer, pp 153-157. | en |
dc.identifier.isbn | 9783540213765 | |
dc.identifier.uri | https://dora.dmu.ac.uk/handle/2086/19886 | |
dc.language.iso | en | en |
dc.peerreviewed | Yes | en |
dc.publisher | Springer | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science;2971 | |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | RFID | en |
dc.subject | Distance Bounding Protocol | en |
dc.subject | relay attacks | en |
dc.subject | Security | en |
dc.subject | trade-off | en |
dc.title | Solution of a Conjecture: On 2-PCD RFID Distance Bounding Protocols | en |
dc.type | Conference | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Solution_of_a_conjecture_distance_isc.pdf
- Size:
- 350.56 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 4.2 KB
- Format:
- Item-specific license agreed upon to submission
- Description: