کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
4954487 | 1443323 | 2017 | 9 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله

چکیده انگلیسی
Distance Bounding (DB) protocol is a lightweight protocol which is used in RFID, NFC and WSN. These protocols enable an entity to determine an upper bound on the physical distance to another entity as well as to authenticate the other entity. This leads to rejection of the requests located out of this distance limitation. So far, many unilateral DB protocols have been proposed to resist mafia and distance fraud attacks. In this paper, we present two unilateral DB protocols. The first one uses predefined delay and two random binary challenges (EBT1) [1] whereas the second protocol uses predefined delay and two different challenges: predefined challenges and random challenges (EBT2). The resistance of these protocols against mafia and distance fraud attacks is better than other unilateral DB protocols. By changing the two random binary challenges into predefined challenge and random challenge, we obtain better resistance to mafia fraud and lower resistance to distance fraud. In addition, the proposed protocols can be applied to passive RFID tags and do not require an extra final signature after the fast bit phase.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Communications - Volume 98, 15 January 2017, Pages 97-105
Journal: Computer Communications - Volume 98, 15 January 2017, Pages 97-105
نویسندگان
Rahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian,