2012
DOI: 10.1007/978-3-642-34129-8_25
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…The idea of a final update phase, similar to [3], can be used here. We note that for each P at least n of its CRPs have to be transmitted after each DBP run to refill V's CRP database.…”
Section: ) Preparationmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of a final update phase, similar to [3], can be used here. We note that for each P at least n of its CRPs have to be transmitted after each DBP run to refill V's CRP database.…”
Section: ) Preparationmentioning
confidence: 99%
“…This leads to the need for a key distribution scheme, typically at the deployment of P. In addition, most DBP schemes use some information from the preparation phase as part of the input to the PRF. This might be just nonces [4], [11] (like N V in Figure 2) or identity information [3], [12]. From that input, the PRF generates a bit string which is then typically split up into two parts.…”
Section: ) Measuring Distancesmentioning
confidence: 99%
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
“…Except the FO protocol [25], because it uses two modes of execution: one verifies the transcript and the other not. PRF Output: From the moment where the output of the PRF is cut into several parts like in [29,42,5,36,7,50,4,34,55,38,51,[20][21][22], it is possible to mount an attack using PRF construction (see Section 3.1) and so an DF attack can be successful. All protocols cited before bear the consequences of this risk.…”
Section: Designmentioning
confidence: 99%
“…Also, this leaked information is such that it does not give the adversary any significant advantage in later attacks onto the scheme, i.e., the coerced prover mounts a valid terrorist-fraud. Similar to TDB and the protocols herein, there is the recent protocol in [49]; however, unlike the protocols herein, the protocol in [49] does not resist these new terrorist-frauds in noisy conditions by Hancke [28]. As a matter of fact, all but two protocols allegedly resisting the classical terrorist-frauds as they were known before Hancke's observation would now collapse under terrorist-frauds executed in this new scenario of Hancke's (at least, cnf.…”
Section: Introductionmentioning
confidence: 99%