Abstract
It is not uncommon to encounter objects with several RFID tags. However, the tags on these objects are generally mobile and move from or to (or, both) the object. No existing RFID authentication protocol considers this scenario. Moreover, an authentication protocol in such a scenario has the potential to be vulnerable to relay attacks where a tag that is not present on the object may pretend to be present. We present an authentication protocol that facilitates inclusion as well as exclusion of RFID tags on an object while simultaneously providing immunity to relay attacks.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Brands, S., Chaum, D.: Distance-Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. In: Computer Fraud & Security, pp. 12-16 (February 1996)
Desmedt, Y.: Major Security Problems with the ‘Unforgeable’ (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. In: Proceedings of the Securicom 88, 6th Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)
Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proceedings of the IEEE/Create-Net SecureComm, pp. 67–73 (2005)
Hering, J.: The BlueSniper ‘rifle.’ presented at 12th DEFCON. Las Vegas (2004)
Kapoor, G., Piramuthu, S.: Protocols for Objects with Multiple RFID Tags. In: Proceedings of the Sixteenth International Conference on Advanced Computing and Communications (ADCOM), pp. 208–213 (2008)
Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 47–58 (2005)
Kirschenbaum, I., Wool, A.: How to Build a Low-Cost, Extended-Range RFID Skimmer. Cryptology ePrint Archive: Report 2006/054 (2006)
Piramuthu, S.: Relay Attack-Resisting Inclusion/Exclusion Protocol for RFID. In: 2nd International Workshop on DYnamic Networks: Algorithms and Security (DYNAS), Bordeaux (2010)
Reid, J., Gonzalez Nieto, J.M., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-Based Protocols. Queensland University of Technology ePrint (2006), http://eprints.qut.edu.au/view/year/2006.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Piramuthu, S. (2011). Inclusion/Exclusion Protocol for RFID Tags. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-17881-8_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17880-1
Online ISBN: 978-3-642-17881-8
eBook Packages: Computer ScienceComputer Science (R0)