A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions

Free registration required

Executive Summary

Radio Frequency IDentification (RFID) systems are vulnerable to relay attacks (i.e., Mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-response exchange of short authenticated messages. Terrorist fraud is the most challenging attack to avoid, because a legitimate user (A tag owner) collaborates with an attacker to defeat the authentication system.

  • Format: PDF
  • Size: 392.5 KB