High-Security, Clone-proof RFID with Secure Distance Bounding

Loading...
Thumbnail Image

Authors

Gerety, Eugene P.
Elleithy, Khaled M.

Issue Date

2014-03-28

Type

Presentation

Language

en_US

Keywords

Engineering , Faculty research day , Radio-frequency identification (RFID) , Distance bounding

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Wireless near-field (NFC) and short-range RFID “security” devices are ubiquitous, commonly found in vehicle security (keyless-entry, remote-start), access control (employee key cards), travel cards, point-of-sale (PoS) transactions via NFC-enabled mobile phone or credit card, among others. Whenever assets of high-value are at stake, adversaries will stop at nothing to gain access to those assets, so it should be assumed that security systems will be subjected to many forms of attack. There have already been several highly publicized successful breaches of keyless entry systems, including relay and key-cloning attacks. This poster describes a a highly-secure, distance-bounding, clone-proof RFID mechanism for protecting high-value assets. The system employs a unique combination of technologies to make it highly-resistant to relay attacks, probing, modeling, cloning and snooping.

Description

Citation

Publisher

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN