Abstract
With the widespread adoption and use of RFID tags, a valid scenario is one in which an RFID-tagged object includes several components that each have their own individual RFID tags. Under such a context, each of the components are bound to be included in or excluded from the main object over its lifetime. In order for only the tags that are a part of the main object to be authenticated by the main object, there is a need for a secure protocol that ensures that no other tag has access to the shared secrets among the main object and the component objects. Moreover, there is also a need to address relay attacks by adversaries under such scenarios. Existing authentication protocols address relay attacks through round-trip distance measurements in such inclusion/exclusion scenarios. While this works in principle, distance-bounding approaches are not always reliable. We consider another approach for inclusion/exclusion scenarios and develop a protocol sketch for this context. We also provide related security analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Greenberg, A.: Radio Attack lets Hackers Steal 24 Different Car Models. Wired, 21 March 2016. https://www.wired.com/2016/03/study-finds-24-car-models-open-unlocking-ignition-hack/
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Proceedings of the IEEE/Create-Net SecureComm, pp. 67–73 (2005)
Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119–133. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_9
Mauw, S., Toro-Pozo, J., Trujillo-Rasua, R.: A class of precomputation-based distance-bounding protocols. In: Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), pp. 97–111 (2016)
Mitrokotsa, A., Onete, C., Vaudenay, S.: Mafia fraud attack against the RC distance-bounding protocol. In: Proceedings of the IEEE International Conference on RFID -Technologies and Applications (RFID-TA), pp. 74–79 (2012)
Piramuthu, S.: Relay attack-resisting inclusion/exclusion protocol for RFID. In: 2nd International Workshop on DYnamic Networks: Algorithms and Security (DYNAS) (2010)
Piramuthu, S.: Inclusion/exclusion protocol for RFID tags. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds.) CCSIT 2011. CCIS, vol. 133, pp. 431–437. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-17881-8_41
Piramuthu, S.: Authentication protocols for an object with dynamic RFID tags. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2018. CCIS, vol. 878, pp. 93–101. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94421-0_7
Rasmussen, K., Čapkun, S.: Location privacy of distance bounding. In: Proceedings of the Annual Conference on Computer and Communications Security (CCS), pp. 149–160 (2008)
Reid, J., Gonzalez Nieto, J.M., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-Based Protocols. Queensland University of Technology ePrint (2006). http://eprints.qut.edu.au/view/year/2006.html
Tu, Y.-J., Piramuthu, S.: RFID distance bounding protocols. In: 1st International EURASIP Workshop on RFID Technology, pp. 67–68 (2007)
Tu, Y.-J., Piramuthu, S.: Non-distance-bounding means to address RFID relay attacks. Decis. Support Syst. 102, 12–21 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Piramuthu, S. (2019). Addressing Relay Attacks Without Distance-Bounding in RFID Tag Inclusion/Exclusion Scenarios. In: Thampi, S., Marques, O., Krishnan, S., Li, KC., Ciuonzo, D., Kolekar, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. SIRS 2018. Communications in Computer and Information Science, vol 968. Springer, Singapore. https://doi.org/10.1007/978-981-13-5758-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-5758-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5757-2
Online ISBN: 978-981-13-5758-9
eBook Packages: Computer ScienceComputer Science (R0)