Mobility

RFID Distance Bounding Protocol With Mixed Challenges to Prevent Relay Attacks

Free registration required

Executive Summary

RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently, distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  • Format: PDF
  • Size: 174.01 KB