Kardaş et al., 2011 - Google Patents
A novel RFID distance bounding protocol based on physically unclonable functionsKardaş et al., 2011
View PDF- Document ID
- 262525007098838745
- Author
- Kardaş S
- Kiraz M
- Bingöl M
- Demirci H
- Publication year
- Publication venue
- International workshop on radio frequency identification: security and privacy issues
External Links
Snippet
Abstract Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (ie, mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kardaş et al. | A novel RFID distance bounding protocol based on physically unclonable functions | |
| Avoine et al. | A framework for analyzing RFID distance bounding protocols | |
| Avoine et al. | An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement | |
| Kardaş et al. | PUF-enhanced offline RFID security and privacy | |
| Fischlin et al. | Terrorism in distance bounding: modeling terrorist-fraud resistance | |
| Sadeghi et al. | Enhancing RFID security and privacy by physically unclonable functions | |
| Dürholz et al. | A formal approach to distance-bounding RFID protocols | |
| Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
| Bultel et al. | A prover-anonymous and terrorist-fraud resistant distance-bounding protocol | |
| Ma et al. | IBIHOP: Proper privacy preserving mutual RFID authentication | |
| Kara et al. | Optimal security limits of RFID distance bounding protocols | |
| Alamr et al. | Secure mutual authentication protocol for RFID based on elliptic curve cryptography | |
| Habibi et al. | Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard | |
| Kardaş et al. | k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions | |
| Sadeghi et al. | Location privacy in RFID applications | |
| Morshed et al. | Efficient mutual authentication protocol for radiofrequency identification systems | |
| KR100605138B1 (en) | Authorization method in radio frequency identification system | |
| Zhuang et al. | Energy-efficient distance-bounding with residual charge computation | |
| Gerault | Security analysis of contactless communication protocols | |
| Maarof et al. | Security analysis of low cost RFID systems | |
| Duc et al. | A survey on RFID security and provably secure grouping-proof protocols | |
| Das et al. | Security analysis of an efficient smart card-based remote user authentication scheme using hash function | |
| Ranasinghe et al. | A low cost solution to authentication in passive RFID systems | |
| Munilla et al. | Enhanced ownership transfer protocol for RFID in an extended communication model | |
| Peris-Lopez et al. | Shedding light on RFID distance bounding protocols and terrorist fraud attacks |