Optimal security limits of RFID distance bounding protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Hi-index | 0.00 |
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple tags are authenticated for their simultaneous presence in the field of the reader.