2011
DOI: 10.3233/jcs-2010-0408
|View full text |Cite
|
Sign up to set email alerts
|

A framework for analyzing RFID distance bounding protocols

Abstract: Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we introduce a unified framework that aims to improve analysis and design of distance bounding protocols. Our framework includes a thorough terminology about the frauds, adversary and prover, thus disambiguating many misleading terms. It also explores the adversa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
133
0
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(134 citation statements)
references
References 43 publications
0
133
0
1
Order By: Relevance
“…Due to our formalization, we prove (contrary to the statements of [2]) that the three types of fraud are independent. Also, [31] shows a formal approach, but against honest provers only and without specifying security goals.…”
Section: Our Contributionsmentioning
confidence: 71%
See 1 more Smart Citation
“…Due to our formalization, we prove (contrary to the statements of [2]) that the three types of fraud are independent. Also, [31] shows a formal approach, but against honest provers only and without specifying security goals.…”
Section: Our Contributionsmentioning
confidence: 71%
“…Avoine et al [2] already laid a concurrent groundwork; our approach here is more formal and rigorous, based on the common game-based notion in cryptography. Due to our formalization, we prove (contrary to the statements of [2]) that the three types of fraud are independent.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Clearly, the jth iteration has τ correct responses with probability bounded by Tail(w j , τ − n + w j , 1 2 ). If w j ≥ ⌈ n 2 ⌉, this is bounded by Tail(⌈ n 2 ⌉, τ − ⌊ n 2 ⌋, 1 2 ).…”
Section: Theorem 19 (Dh-resistancementioning
confidence: 99%
“…Based on ρ, we construct a binary tree T of depth ns in which a node at depth q corresponds to the selection of c q . We denote by G(c|c 1 …”
Section: Lemma 14 (Straightline Extractor) Under the Assumption Thatmentioning
confidence: 99%
See 1 more Smart Citation