Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

MEED: A Memory-efficient Distance Bounding Protocol with Error Detection

View through CrossRef
Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attacks are a hot topic recently. A relay attack is a form of man-in-the-middle (MITM) attack where the adversary manipulates the communication by only relaying the verbatim messages between two parties. The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round-trip time between the reader and the tag, more precisely, it uses bit exchanges for a series of rapid challenge-response rounds in RFID systems. In 2005, Hancke and Kuhn first introduced distance bounding protocol into RFID systems, after that, many schemes have been proposed based on this protocol. However, most schemes tend to a more complex design to decrease adversary's success probability. In this paper, we propose a novel distance bounding protocol named MEED, using only 2n bits of memory, which, to our best knowledge, is equal to Hancke and Kuhn's protocol and less than any existing protocols. In addition, by using our protocol, the tag is able to detect adversary's malicious queries. We also make a comparison with typical previous distance bounding protocols in both memory and mafia fraud success probability.
Title: MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
Description:
Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attacks are a hot topic recently.
A relay attack is a form of man-in-the-middle (MITM) attack where the adversary manipulates the communication by only relaying the verbatim messages between two parties.
The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round-trip time between the reader and the tag, more precisely, it uses bit exchanges for a series of rapid challenge-response rounds in RFID systems.
In 2005, Hancke and Kuhn first introduced distance bounding protocol into RFID systems, after that, many schemes have been proposed based on this protocol.
However, most schemes tend to a more complex design to decrease adversary's success probability.
In this paper, we propose a novel distance bounding protocol named MEED, using only 2n bits of memory, which, to our best knowledge, is equal to Hancke and Kuhn's protocol and less than any existing protocols.
In addition, by using our protocol, the tag is able to detect adversary's malicious queries.
We also make a comparison with typical previous distance bounding protocols in both memory and mafia fraud success probability.

Related Results

Review of Bounding Box Algorithm Based on 3D Point Cloud
Review of Bounding Box Algorithm Based on 3D Point Cloud
Abstract Collision detection is mainly to judge whether there is intersection between virtual models, which means there is collision. Bounding box is one of the impo...
Single-Stage Rotation-Decoupled Detector for Oriented Object
Single-Stage Rotation-Decoupled Detector for Oriented Object
Oriented object detection has received extensive attention in recent years, especially for the task of detecting targets in aerial imagery. Traditional detectors locate objects by ...
Online Education
Online Education
Online education is considered the latest generation in the practice of distance education. As described by professionals in the field, distance education is a form of teaching and...
Deep learning for small object detection in images
Deep learning for small object detection in images
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] With the rapid development of deep learning in computer vision, especially deep convolutional neural network...
MARS-seq2.0: an experimental and analytical pipeline for indexed sorting combined with single-cell RNA sequencing v1
MARS-seq2.0: an experimental and analytical pipeline for indexed sorting combined with single-cell RNA sequencing v1
Human tissues comprise trillions of cells that populate a complex space of molecular phenotypes and functions and that vary in abundance by 4–9 orders of magnitude. Relying solely ...
Abnormal Status Detection of Catenary Based on TSNE Dimensionality Reduction Method and IGWO-LSSVM Model
Abnormal Status Detection of Catenary Based on TSNE Dimensionality Reduction Method and IGWO-LSSVM Model
Background: Catenary is a crucial component of an electrified railroad's traction power supply system. There is a considerable incidence of abnormal status and failures due to prol...
Errors
Errors
When we compare study group/s with a control group in a research, there can be ‘errors’. Error is the difference between the ‘fact’ and our ‘finding’. In other words, error is the ...

Back to Top