User menu

An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement

Bibliographic reference Avoine, Gildas ; Tchamkerten, Aslan. An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement.Information Security. 12th International Conference, ISC 2009 (Pisa, Italy, 7-9 September 2009). In: Samarati, P.; Ardagna, C.A.; Yung, M.; Martinelli, F.;, Information Security. 12th International Conference, ISC 2009, Springer verlag2009, p. 250-261
Permanent URL
  1. Karygiannis, T., Eydt, B., Barber, G., Bunn, L., Phillips, T.: Guidelines for securing radio frequency identification (RFID) systems – special publication 800-98. Recommandations of the National Institute of Standards and Technology (April 2007)
  2. Desmedt Yvo, Goutier Claude, Bengio Samy, Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract), Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.21-39, 10.1007/3-540-48184-2_3
  3. ISO/IEC 14443: Identification cards – contactless integrated circuit(s) cards – proximity cards
  4. ISO/IEC 15693: Identification cards – contactless integrated circuit(s) cards – vicinity integrated circuit(s) card
  5. Hancke, G.: A practical relay attack on ISO 14443 proximity cards (February 2005) (manuscript)
  6. Halváč, M., Rosa, T.: A Note on the Relay Attacks on e-Passports: The Case of Czech e-Passports. Cryptology ePrint Archive, Report 2007/244 (2007)
  7. ICAO DOC–9303: Machine readable travel documents, part 1, vol. 2 (November 2004)
  8. Brands Stefan, Chaum David, Distance-Bounding Protocols, Advances in Cryptology — EUROCRYPT ’93 ISBN:9783540576006 p.344-359, 10.1007/3-540-48285-7_30
  9. Beth Thomas, Desmedt Yvo, Identification Tokens — or: Solving The Chess Grandmaster Problem, Advances in Cryptology-CRYPT0’ 90 ISBN:9783540545088 p.169-176, 10.1007/3-540-38424-3_12
  10. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm 2005, Athens, Greece. IEEE, Los Alamitos (2005)
  11. Bussard Laurent, Roudier Yves, Embedding Distance-Bounding Protocols within Intuitive Interactions, Security in Pervasive Computing (2004) ISBN:9783540208877 p.143-156, 10.1007/978-3-540-39881-3_14
  12. Bussard Laurent, Bagga Walid, Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks, Security and Privacy in the Age of Ubiquitous Computing (2005) ISBN:9780387256580 p.223-238, 10.1007/0-387-25660-1_15
  13. Munilla, J., Ortiz, A., Peinado, A.: Distance Bounding Protocols with Void-Challenges for RFID. Printed handout of Workshop on RFID Security – RFIDSec 2006 (July 2006)
  14. Singelée Dave, Preneel Bart, Distance Bounding in Noisy Environments, Security and Privacy in Ad-hoc and Sensor Networks ISBN:9783540732747 p.101-115, 10.1007/978-3-540-73275-4_8
  15. Munilla, J., Peinado, A.: Attacks on Singelee and Preneel’s protocol. Cryptology ePrint Archive, Report 2008/283 (June 2008)
  16. Nikov, V., Vauclair, M.: Yet Another Secure Distance-Bounding Protocol. Cryptology ePrint Archive, Report 2008/319 (2008),
  17. Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks – SASN 2003, pp. 21–32 (2003)
  18. Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: International Conference on Information Security and Cryptology – ICISC, Seoul, Korea. LNCS. Springer, Heidelberg (2008)
  19. Tu, Y.J., Piramuthu, S.: RFID Distance Bounding Protocols. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria (September 2007)
  20. Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: 2. In: Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Advances in Information Security series, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, vol. 30, pp. 279–298. Springer, Heidelberg (2007)
  21. Reid Jason, Nieto Juan M. Gonzalez, Tang Tee, Senadji Bouchra, Detecting relay attacks with timing-based protocols, 10.1145/1229285.1229314
  22. ISO/IEC 9798: Information technology – security techniques – entity authentication
  23. Oberthur Card Systems: Id-one epass
  24. ISO/IEC 10118-2: Information technology – security techniques – hash-functions – part 2: Hash-functions using an n-bit block cipher
  25. Feldhofer Martin, Dominikus Sandra, Wolkerstorfer Johannes, Strong Authentication for RFID Systems Using the AES Algorithm, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.357-370, 10.1007/978-3-540-28632-5_26