Special Issue Paper
Chaotic masking for securing RFID systems against relay attacks
Article first published online: 27 JUN 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 6, Issue 12, pages 1496–1508, December 2013
How to Cite
Malek, B. and Miri, A. (2013), Chaotic masking for securing RFID systems against relay attacks. Security Comm. Networks, 6: 1496–1508. doi: 10.1002/sec.586
- Issue published online: 28 NOV 2013
- Article first published online: 27 JUN 2012
- RFID authentication;
- relay attack;
- chaotic system;
- chaos suppression
The relay attack is a simple yet effective attack against most radio-frequency identification (RFID) authentication systems. Because of the minimalist design of an RFID system, a lightweight authentication scheme must be designed to provide a strong level of security for low-cost RFID tags. In this work, we propose a simple but secure masking scheme that counters the relay attack in RFID systems. Our scheme is the first solution based on the chaos suppression theory. We have exploited the chaotic characteristics of a dynamic Lorenz controller to distinguish a legitimate RFID reader from a proxy reader in the relay attack. We also show that the proposed approach is practical using simulation results. Copyright © 2012 John Wiley & Sons, Ltd.