Security Analysis of Tu and Piramuthu's Protocol

RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary...

Full description

Saved in:
Bibliographic Details
Published in:2008 New Technologies, Mobility and Security pp. 1 - 5
Main Authors: Munilla, J., Peinado, A.
Format: Conference Proceeding
Language:English
Published: IEEE 01-11-2008
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.
ISBN:9782953244304
1424435471
9781424435470
2953244301
ISSN:2157-4952
DOI:10.1109/NTMS.2008.ECP.88