A framework for analyzing RFID distance bounding protocols

被引:63
作者
Avoine, Gildas [1 ]
Bingol, Muhammed Ali [2 ,3 ]
Kardas, Suleyman [2 ,4 ]
Lauradoux, Cedric [5 ]
Martin, Benjamin [1 ]
机构
[1] Catholic Univ Louvain, Louvain, Belgium
[2] TUBITAK UEKAE, Gebze, Kocaeli, Turkey
[3] Istanbul Tech Univ, Inst Sci & Technol, Istanbul, Turkey
[4] Sabanci Univ, Istanbul, Turkey
[5] Univ Lyon, INSA Lyon, INRIA, CITI, Lyon, France
关键词
RFID; distance bounding; proximity check; authentication;
D O I
10.3233/JCS-2010-0408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we introduce a unified framework that aims to improve analysis and design of distance bounding protocols. Our framework includes a thorough terminology about the frauds, adversary and prover, thus disambiguating many misleading terms. It also explores the adversary's capabilities and strategies, and addresses the impact of the prover's ability to tamper with his device. It thus introduces some new concepts in the distance bounding domain as the black-box and white-box models, and the relation between the frauds with respect to these models. The relevancy and impact of the framework is finally demonstrated on a study case: Munilla-Peinado distance bounding protocol.
引用
收藏
页码:289 / 317
页数:29
相关论文
共 58 条
[1]  
ALKASSAR A, 2003, P 2003 WORKSH NEW SE, P77
[2]  
Anderson R. J., 2001, SECURITY ENG GUIDE B
[3]  
Anderson R, 2007, LECT NOTES COMPUT SC, V4886, P46, DOI 10.1007/978-3-540-77366-5_6
[4]  
[Anonymous], 14443 ISOIEC
[5]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5922, P290, DOI 10.1007/978-3-642-10628-6_20
[6]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[7]  
Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
[8]  
BETH T, 1991, LECT NOTES COMPUT SC, V537, P169
[9]  
Blaze M., 2000, LECT NOTES COMPUTER, V2133, P54
[10]  
BRANDS S, 1993, LECT NOTES COMPUTER, V765, P344, DOI DOI 10.1007/3-540-48285-7_30