2010
DOI: 10.1007/978-3-642-16822-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Security Limits of RFID Distance Bounding Protocols

Abstract: In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-PCD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…As she diverges from the verifier after a certain range she cannot receive also c i−1 , and so on. This leads to some concentric neighborhoods around the verifier which is addressed in [35]. The success probability of the attack may increase as the prover locates in a closer region between those neighborhoods.…”
Section: Distance Between Verifier and Provermentioning
confidence: 98%
“…As she diverges from the verifier after a certain range she cannot receive also c i−1 , and so on. This leads to some concentric neighborhoods around the verifier which is addressed in [35]. The success probability of the attack may increase as the prover locates in a closer region between those neighborhoods.…”
Section: Distance Between Verifier and Provermentioning
confidence: 98%
“…Previous-challenge dependent distance-bounding protocols are analyzed by Kara, Kardaş, Bingöl, and Avoine in [45]. They focus on the low-cost distance-bounding protocols having bitwise fast phases and no final signature.…”
Section: Previous-challenge Dependent Protocolsmentioning
confidence: 99%
“…The success probabilities against the mafia fraud and distance fraud are both equal to (3/4) n [14,19]. Distance bounding protocols are classified into two classes depending on whether a final signature is involved (e.g., [2,19,20,23,25,32,33]). These papers mostly focused on improving the security against mafia and distance frauds, and in fact some of them achieved the ideal security level (1/2) n against only both frauds.…”
Section: Distance Bounding Protocolsmentioning
confidence: 99%