Javascript must be enabled to continue!
MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
View through CrossRef
Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attacks are a hot topic recently. A relay attack is a form of man-in-the-middle (MITM) attack where the adversary manipulates the communication by only relaying the verbatim messages between two parties. The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round-trip time between the reader and the tag, more precisely, it uses bit exchanges for a series of rapid challenge-response rounds in RFID systems. In 2005, Hancke and Kuhn first introduced distance bounding protocol into RFID systems, after that, many schemes have been proposed based on this protocol. However, most schemes tend to a more complex design to decrease adversary's success probability. In this paper, we propose a novel distance bounding protocol named MEED, using only 2n bits of memory, which, to our best knowledge, is equal to Hancke and Kuhn's protocol and less than any existing protocols. In addition, by using our protocol, the tag is able to detect adversary's malicious queries. We also make a comparison with typical previous distance bounding protocols in both memory and mafia fraud success probability.
Title: MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
Description:
Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attacks are a hot topic recently.
A relay attack is a form of man-in-the-middle (MITM) attack where the adversary manipulates the communication by only relaying the verbatim messages between two parties.
The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round-trip time between the reader and the tag, more precisely, it uses bit exchanges for a series of rapid challenge-response rounds in RFID systems.
In 2005, Hancke and Kuhn first introduced distance bounding protocol into RFID systems, after that, many schemes have been proposed based on this protocol.
However, most schemes tend to a more complex design to decrease adversary's success probability.
In this paper, we propose a novel distance bounding protocol named MEED, using only 2n bits of memory, which, to our best knowledge, is equal to Hancke and Kuhn's protocol and less than any existing protocols.
In addition, by using our protocol, the tag is able to detect adversary's malicious queries.
We also make a comparison with typical previous distance bounding protocols in both memory and mafia fraud success probability.
Related Results
Review of Bounding Box Algorithm Based on 3D Point Cloud
Review of Bounding Box Algorithm Based on 3D Point Cloud
Abstract
Collision detection is mainly to judge whether there is intersection between virtual models, which means there is collision. Bounding box is one of the impo...
Single-Stage Rotation-Decoupled Detector for Oriented Object
Single-Stage Rotation-Decoupled Detector for Oriented Object
Oriented object detection has received extensive attention in recent years, especially for the task of detecting targets in aerial imagery. Traditional detectors locate objects by ...
Online Education
Online Education
Online education is considered the latest generation in the practice of distance education. As described by professionals in the field, distance education is a form of teaching and...
P019: Prehospital diversion of intoxicated patients to a detoxification facility vs the emergency department: safety and compliance of an EMS direct transport protocol
P019: Prehospital diversion of intoxicated patients to a detoxification facility vs the emergency department: safety and compliance of an EMS direct transport protocol
Introduction: Prehospital transport of patients to an alternative destination (diversion) has been proposed as part of a solution to overcrowding in emergency departments (ED). We ...
Deep learning for small object detection in images
Deep learning for small object detection in images
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] With the rapid development of deep learning in computer vision, especially deep convolutional neural network...
MARS-seq2.0: an experimental and analytical pipeline for indexed sorting combined with single-cell RNA sequencing v1
MARS-seq2.0: an experimental and analytical pipeline for indexed sorting combined with single-cell RNA sequencing v1
Human tissues comprise trillions of cells that populate a complex space of molecular phenotypes and functions and that vary in abundance by 4–9 orders of magnitude. Relying solely ...
Abnormal Status Detection of Catenary Based on TSNE Dimensionality
Reduction Method and IGWO-LSSVM Model
Abnormal Status Detection of Catenary Based on TSNE Dimensionality
Reduction Method and IGWO-LSSVM Model
Background:
Catenary is a crucial component of an electrified railroad's traction power supply system.
There is a considerable incidence of abnormal status and failures due to prol...

