A highly efficient RFID distance bounding protocol without real-time PRF evaluation
There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast ph...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7376 https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8379 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83792022-10-13T07:41:51Z A highly efficient RFID distance bounding protocol without real-time PRF evaluation ZHUANG, Yunhui YANG, Anjia WONG, Duncan S. YANG, Guomin XIE, Qi There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding. 2013-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7376 info:doi/10.1007/978-3-642-38631-2_33 https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Distance Bounding Mutual Authentication Privacy RFID Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Distance Bounding Mutual Authentication Privacy RFID Information Security |
spellingShingle |
Distance Bounding Mutual Authentication Privacy RFID Information Security ZHUANG, Yunhui YANG, Anjia WONG, Duncan S. YANG, Guomin XIE, Qi A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
description |
There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding. |
format |
text |
author |
ZHUANG, Yunhui YANG, Anjia WONG, Duncan S. YANG, Guomin XIE, Qi |
author_facet |
ZHUANG, Yunhui YANG, Anjia WONG, Duncan S. YANG, Guomin XIE, Qi |
author_sort |
ZHUANG, Yunhui |
title |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
title_short |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
title_full |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
title_fullStr |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
title_full_unstemmed |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation |
title_sort |
highly efficient rfid distance bounding protocol without real-time prf evaluation |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2013 |
url |
https://ink.library.smu.edu.sg/sis_research/7376 https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf |
_version_ |
1770576321496219648 |