高级检索
    辛 伟, 孙惠平, 陈 钟. RFID距离约束协议的分析与设计[J]. 计算机研究与发展, 2013, 50(11): 2358-2366.
    引用本文: 辛 伟, 孙惠平, 陈 钟. RFID距离约束协议的分析与设计[J]. 计算机研究与发展, 2013, 50(11): 2358-2366.
    Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    Citation: Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.

    RFID距离约束协议的分析与设计

    Analysis and Design of Distance-Bounding Protocols for RFID

    • 摘要: 中继攻击给无线射频识别(RFID)安全带来了巨大威胁,攻击者通过原封不动地转发RFID读写器和标签的通信消息的方式,增加了读写器和标签通信的距离,破坏了RFID默认为短距离通信的隐含假设.而抵御中继攻击的主要方法是采用基于测量读写器与标签之间通信时间的距离约束协议,Hancke和Kuhn在2005年提出了第1个RFID距离约束协议HK,自此以后,陆续有新的距离约束协议问世.目的就是设计一个距离约束协议来抵御中继攻击,同时该协议适合于RFID标签计算资源有限的特点.首先回顾了已有的各种距离约束协议,分析了这些协议的优点和缺陷,并提出了针对距离约束协议的攻击模型,最后,基于HK协议,提出了一个新的距离约束协议HKM,该协议采用预定义质询和随机质询相结合的方式,并充分利用了HK协议浪费的内存,通过与现有的几个典型的距离约束协议进行对比,该协议在内存消耗和抵御中继攻击两个方面有较好的表现.

       

      Abstract: Relay attacks pose a serious threat to the security of radio frequency identification systems. The adversary manipulates the communication by only relaying the verbatim messages between a reader and a tag in order to increase the communication distance between them, which breaks the implicit assumption that a tag is actually within a very short distance of a reader. The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round-trip time between the reader and the tag. In 2005, Hancke and Kuhn proposed the first distance-bounding protocol dedicated to RFID system named HK. From then on, a number of relative schemes have been proposed subsequently in literature. In this paper, we design a distance-bounding protocol suited for computation limited RFID tags against relay attacks. We firstly review the existing RFID distance-bounding protocols. Weaknesses and advantages in these protocols are examined. In addition, we propose an attack model for designing and analyzing RFID distance-bounding protocols. Finally, we propose a novel distance bounding protocol based on HK protocol named HKM. It mixes the predefined challenge and the random challenge, and takes advantage of the wasting memory of HK protocol. Compared with the existing distance bounding protocols, HKM has good performance in both memory consuming and resistance to relay attacks.

       

    /

    返回文章
    返回