2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008
DOI: 10.1109/euc.2008.48
|View full text |Cite
|
Sign up to set email alerts
|

Distance Bounding Protocol for Multiple RFID Tag Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
“…They are in bold in Tables 1 and 2, and are the following: KZP (2008) [33], Hitomi (2010) [45], NUS (2011) [28], SKI pro (2013) [9], FO (2013) [25], DB1 (2014) [12], DB2 (2014) [12], ProProx (2014) [53] and VSSDB (2014) [26]. The security level for impersonation fraud are the same for all these protocols and it is the best security level, i.e., it is equivalent at the security against brute force.…”
Section: Comparison Of Db Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Distance-Bounding Protocols. The great majority of distance-bounding protocols [10,12,14,16] consist of a data-agreement phase or initialisation phase and a time-critical, fast computation-based distance-bounding phase. Fig.…”
Section: Distance-bounding Protocols and The Prf Assumptionmentioning
confidence: 99%
“…The tag is often referred to as the prover whereas the reader is referred to as a verifier. In the vast literature covering such protocols (e.g., [10,12,14,16]), three main/classical types of possible attacks have been distinguished. The first is distance-fraud (DF), in which a prover tries to convince that he is closer than what he really is.…”
Section: Introductionmentioning
confidence: 99%