Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication

Research on Defense Technology of Relay Attacks in RFID Systems

Authors
Weiwei Shen, He Xu, Rui Sun, Ruchuan Wang
Corresponding Author
Weiwei Shen
Available Online July 2015.
DOI
10.2991/csic-15.2015.5How to use a DOI?
Keywords
Relay attack, RFID systems, Distance bounding protocol, based on the button, Noise
Abstract

Relay attack is the most menacing attack that radio frequency identification technology (RFID) systems are facing currently. An attacker could use limited resources to build up this kind of attack with the encryption algorithm which is difficult to detect out. At present, the main methods to resist the relay attack in RFID system include measuring the received signal strength (RSS) between the reader and the tag, the round-trip time (RTT) of the signal and introducing a second channel - Environmental Conditions. Most of the studies nowadays are adopted the distance bounding protocols which can resist the relay attack by measuring the round-trip time of the short authentication messages between the tag and reader. Many of these protocols have been proposed, such as Hancke and Kuhn's(HK) protocol, Munilla, Ortiz and Peinado's (MOP) protocol and so on. In recent years, researchers have put forward a brand-new solution of using the second channel - environmental conditions to resist relay attack, such as using button, noise, temperature, etc. This paper mainly does research on the defense techniques for relay attacks in the RFID system and gives some introductions and summaries of the domestic and foreign relevant situation against such attacks.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication
Series
Advances in Computer Science Research
Publication Date
July 2015
ISBN
10.2991/csic-15.2015.5
ISSN
2352-538X
DOI
10.2991/csic-15.2015.5How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Weiwei Shen
AU  - He Xu
AU  - Rui Sun
AU  - Ruchuan Wang
PY  - 2015/07
DA  - 2015/07
TI  - Research on Defense Technology of Relay Attacks in RFID Systems
BT  - Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication
PB  - Atlantis Press
SP  - 18
EP  - 22
SN  - 2352-538X
UR  - https://doi.org/10.2991/csic-15.2015.5
DO  - 10.2991/csic-15.2015.5
ID  - Shen2015/07
ER  -