Non-Uniform Stepping Approach to RFID Distance Bounding Problem Ali Ozhan Gurel (National Research Institute of Electronics and Cryptology, Turkey), Atakan Arslan (National Research Institute of Electronics and Cryptology, Turkey), Mete Akgun (National Research Institute of Electronics and Cryptology, Turkey). |
---|
RFID systems are vulnerable to
relay attacks (mafia fraud and terrorist fraud) as well as distance
fraud. Several distance bounding protocols suitable to RFID systems
were proposed to avoid these attacks. The common point of these
protocols is to try to reduce success probability of the attacker. To
the best of our knowledge, there is no RFID distance bounding protocol
without final signature that provides success probability of attacker
smaller than (3/4)n in the presence of all frauds. In this paper, we
propose an RFID distance bounding protocol that creates binary
responses by traversing the register with non-uniform steps based on
the secret key in addition to binary challenges. Our protocol without
final signature is the first to converge the success probability of
the attacker to the ideal case, which is (1/2)n for all frauds.
Furthermore, our protocol is robust against disturbances of channel,
has low computational cost and also provides privacy
|
Keywords: Ashby's Law of Requisite Variety, Systems, Macroeconomics, Surveillance; Security, Privacy. |