首页> 外文期刊>Decision support systems >Lightweight non-distance-bounding means to address RFID relay attacks
【24h】

Lightweight non-distance-bounding means to address RFID relay attacks

机译:轻巧的无距离限制手段,可解决RFID中继攻击

获取原文
获取原文并翻译 | 示例
           

摘要

A relay attack is accomplished by simply relaying messages between a prover (e.g., an RFID tag) and a verifier (e.g., an RFID reader) with the goal of convincing the verifier of its close physical proximity to the prover. In almost all relay attack scenarios, the verifier essentially communicates with a prover that is outside the verifier's read-range. Relay attacks are notorious since they occur without the knowledge of the reader and/or tag, and has the potential to cause damage to honest parties (here, RFID reader and/or tag). Almost all means to address relay attacks in RFID systems to date are based on the proximity check idea that involves the measurement of message round trip times between tag and reader. With the speed of light at play, such measurements need not necessarily be accurate and could result in the false assumption of relay attack absence. Our review of published literature on approaches that use non-distance-based means to address relay attacks revealed ambient conditions' potential. We critically evaluate ambient conditions and develop a lightweight mutual authentication protocol that is based on magnetometer readings to address relay attacks. (C) 2017 Elsevier B.V. All rights reserved.
机译:中继攻击是通过简单地在证明者(例如,RFID标签)和验证者(例如,RFID读取器)之间中继消息来完成的,目的是说服验证者在物理上接近证明者。在几乎所有中继攻击方案中,验证程序实际上都与验证程序读取范围之外的验证程序进行通信。中继攻击之所以臭名昭著,是因为中继攻击是在不了解读取器和/或标签的情况下发生的,并且有可能对诚实的参与者(在这里是RFID读取器和/或标签)造成损害。迄今为止,解决RFID系统中中继攻击的几乎所有手段都是基于接近度检查的思想,该思想涉及对标签和阅读器之间消息往返时间的测量。随着光速的发挥,这种测量不一定必须是准确的,并且可能导致错误地假设没有接力进攻。我们对使用基于非距离的方法来解决中继攻击的方法的已发表文献的回顾揭示了环境条件的潜力。我们严格评估环境条件,并开发基于磁力计读数的轻量级双向身份验证协议,以解决中继攻击。 (C)2017 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号