High-Security, Clone-proof RFID with Secure Distance Bounding

Thumbnail Image
Authors
Gerety, Eugene P.
Elleithy, Khaled M.
Issue Date
2014-03-28
Type
Presentation
Language
en_US
Keywords
Engineering , Faculty research day , Radio-frequency identification (RFID) , Distance bounding
Research Projects
Organizational Units
Journal Issue
Alternative Title
Abstract
Wireless near-field (NFC) and short-range RFID “security” devices are ubiquitous, commonly found in vehicle security (keyless-entry, remote-start), access control (employee key cards), travel cards, point-of-sale (PoS) transactions via NFC-enabled mobile phone or credit card, among others. Whenever assets of high-value are at stake, adversaries will stop at nothing to gain access to those assets, so it should be assumed that security systems will be subjected to many forms of attack. There have already been several highly publicized successful breaches of keyless entry systems, including relay and key-cloning attacks. This poster describes a a highly-secure, distance-bounding, clone-proof RFID mechanism for protecting high-value assets. The system employs a unique combination of technologies to make it highly-resistant to relay attacks, probing, modeling, cloning and snooping.
Description
Citation
Publisher
License
Journal
Volume
Issue
PubMed ID
DOI
ISSN
EISSN