An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an authentication process between a verifier and a remote legitimate prover. This attack is a major concern for certain RFID systems, especially for payment related applications. Previously proposed protocols that thwart the Mafia fraud treat relaying and non-relaying types of attacks equally: whether or not signal relaying is performed, the same probability of false-acceptance is achieved. Naturally, one would expect that non-relay type of attacks achieve a lower probability of false-acceptance. We propose a low complexity authentication protocol that achieves a probability of false-acceptance essentially equal to the best possible false-acceptance probability in the presence of Mafia frauds. This performance is achieved without degrading the performance of the protocol in the non-relay setting. As an additional feature, the verifier can make a rational decision to accept or to reject a proof of identity even if the protocol gets unexpectedly interrupted.

Original languageEnglish
Title of host publicationInformation Security - 12th International Conference, ISC 2009, Proceedings
PublisherSpringer Verlag
Pages250-261
Number of pages12
ISBN (Print)3642044735, 9783642044731
DOIs
Publication statusPublished - 1 Jan 2009
Event12th Information Security Conference, ISC 2009 - Pisa, Italy
Duration: 7 Sept 20099 Sept 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5735 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th Information Security Conference, ISC 2009
Country/TerritoryItaly
CityPisa
Period7/09/099/09/09

Keywords

  • Authentication
  • False-acceptance rate
  • Mafia fraud
  • Memory
  • Proximity check
  • RFID
  • Relay attack

Fingerprint

Dive into the research topics of 'An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement'. Together they form a unique fingerprint.

Cite this