Title
Distance‐bounding trust protocol in anonymous radio‐frequency identification systems
Abstract
Both distance fraud attacks and relay attacks threaten radio-frequency identification (RFID) applications but are hard to prevent. Existing approaches can neither avoid tags to response the rouge reader's challenges nor have the simultaneous feature to defend the two kinds of attacks. In a first step, this paper presents an improved distance-bounding protocol that a tag deduces the distance to a reader and reports if the reader is honest or malicious through the output of trust values that can defend distance fraud. When multiple readers are synchronized and scheduled, we just logically threat them as one. So our solutions fix a flaw in prior work that may be leveraged by attackers to increase the successful rate of discovering relay attack. Secondly, we deploy trusted third party architecture to provide anonymity for tags in anonymous RFID systems without requiring tag identifiers. Existing distance-based attack detection methods are not applicable in anonymous RFID systems because of the requirement of awareness of tag identifiers. This insight inspires Distance-Bounding Trust Protocol (DBTP), which is for both distance fraud and relay attacks detection in anonymous RFID systems. DBTP can make correct decisions through trust values in accepting or rejecting a reader's challenge by establishing collaborations and trust relationship between one reader (verifier) and active tags (provers). We evaluate the performance of DBTP through theoretical analysis and extensive simulations. The results show that DBTP can detect both distance fraud and relay attacks, and it is effective to guarantee security for anonymous RFID systems. Copyright (c) 2015 John Wiley & Sons, Ltd.
Year
DOI
Venue
2015
10.1002/cpe.3500
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Keywords
Field
DocType
anonymous RFID systems,distance-bounding protocols,distance fraud and relay attacks,security
Trusted third party,Relay attack,Trust relationship,Identifier,Computer science,Computer security,Anonymity,Radio-frequency identification,Relay,Bounding overwatch
Journal
Volume
Issue
ISSN
27
SP16
1532-0626
Citations 
PageRank 
References 
1
0.38
13
Authors
5
Name
Order
Citations
PageRank
Fan Yang131.13
Fengli Zhang210.38
Jiahao Wang3124.12
Zhiguang Qin432163.02
Xiaolu Yuan510.38