Title: Novel implementation of defence strategy of relay attack based on cloud in RFID systems

Authors: He Xu; Weiwei Shen; Peng Li; Keith Mayes; Ruchuan Wang; Dashen Li; Shengxiang Yang

Addresses: School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, 210003, China ' School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, 210003, China ' School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, 210003, China ' Information Security Group, School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK ' School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, 210003, China ' School of Computer Science and Technology, School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China ' School of Computer Science and Technology, School of Software, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China

Abstract: Radio frequency identification technology (RFID) is widely used in identity authentication and payment, and it also becomes an indispensable part of daily life. Cloud-based RFID systems have broad application prospects, and can be provided as a service to individuals or organisations. For example, RFID cards can be used for cash-less payment, physical access control, temporary rights and identification in cloud environment. When an RFID card is used, there is a wireless transaction between the card and its reader, which could be attacked by several methods, including a relay attack. Relay attacks are difficult to completely prevent and a serious threat to RFID systems security. An attacker could use limited resources to build up this kind of attack and may need little knowledge of the underlying protocol. In recent years, researchers have proposed solutions using second channels to resist relay attack, such as using environmental measurements including noise, light and temperature. This paper describes research on the defence techniques for relay attacks in cloudbased RFID systems. The cloud-based architecture for RFID systems typically consists of RFID tags, card readers (fixed or mobile) and cloud-based server functionality.

Keywords: relay attack; radio frequency identification technology; RFID systems; internet of things; NFC.

DOI: 10.1504/IJICS.2019.098199

International Journal of Information and Computer Security, 2019 Vol.11 No.2, pp.120 - 144

Available online: 30 Jan 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article