A highly efficient RFID distance bounding protocol without real-time PRF evaluation

There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast ph...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHUANG, Yunhui, YANG, Anjia, WONG, Duncan S., YANG, Guomin, XIE, Qi
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7376
https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8379
record_format dspace
spelling sg-smu-ink.sis_research-83792022-10-13T07:41:51Z A highly efficient RFID distance bounding protocol without real-time PRF evaluation ZHUANG, Yunhui YANG, Anjia WONG, Duncan S. YANG, Guomin XIE, Qi There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding. 2013-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7376 info:doi/10.1007/978-3-642-38631-2_33 https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Distance Bounding Mutual Authentication Privacy RFID Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Distance Bounding
Mutual Authentication
Privacy
RFID
Information Security
spellingShingle Distance Bounding
Mutual Authentication
Privacy
RFID
Information Security
ZHUANG, Yunhui
YANG, Anjia
WONG, Duncan S.
YANG, Guomin
XIE, Qi
A highly efficient RFID distance bounding protocol without real-time PRF evaluation
description There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding.
format text
author ZHUANG, Yunhui
YANG, Anjia
WONG, Duncan S.
YANG, Guomin
XIE, Qi
author_facet ZHUANG, Yunhui
YANG, Anjia
WONG, Duncan S.
YANG, Guomin
XIE, Qi
author_sort ZHUANG, Yunhui
title A highly efficient RFID distance bounding protocol without real-time PRF evaluation
title_short A highly efficient RFID distance bounding protocol without real-time PRF evaluation
title_full A highly efficient RFID distance bounding protocol without real-time PRF evaluation
title_fullStr A highly efficient RFID distance bounding protocol without real-time PRF evaluation
title_full_unstemmed A highly efficient RFID distance bounding protocol without real-time PRF evaluation
title_sort highly efficient rfid distance bounding protocol without real-time prf evaluation
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/7376
https://ink.library.smu.edu.sg/context/sis_research/article/8379/viewcontent/A_highly_efficient_RFID_distance_bounding_protocol_without_real_time_PRF_evaluation.pdf
_version_ 1770576321496219648