• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 70
Next 10 →

RFID distance bounding protocol with mixed challenges to prevent relay attacks.

by Chong Hee Kim , Gildas Avoine - In The 8th International Conference on Cryptology And Network Security, CANS , 2009
"... Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in ..."
Abstract - Cited by 23 (2 self) - Add to MetaCart
-in-themiddle who relays the signal between the two entities, possibly without knowing the specifications of the protocol used on the channel. Recently, distance bounding protocols measuring the round-trip times of messages exchanged between the reader and the tag have been designed to prevent this attack. Almost

The Swiss-Knife RFID Distance Bounding Protocol

by Chong Hee Kim, Gildas Avoine - In ICISC (2008
"... Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance boundin ..."
Abstract - Cited by 37 (1 self) - Add to MetaCart
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance

Multichannel protocols to prevent relay attacks

by Frank Stajano, Ford-Long Wong, Bruce Christianson , 2009
"... A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encrypting the communication between the honest endpoints does not protect against such attacks. The main solution that has ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
been offered to date is distance bounding, in which a tightly timed exchange of challenges and responses persuades the verifier that the prover cannot be further away than a certain distance. This solution, however, still won't say whether the specific endpoint the verifier is talking

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

by Pedro Peris-lopez, Julio C. Hern, Aikaterini Mitrokotsa, Juan M. E. Tapiador , 2010
"... The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prov ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last

A formal approach to distance-bounding RFID protocols

by Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete - In Information Security Conference (ISC) 2011, LNCS , 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different

Detecting Relay Attacks with Timing-Based Protocols

by Jason Reid, Juan M. González Nieto, Tee Tang, Bouchra Senadji - Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security , 2007
"... Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks pres ..."
Abstract - Cited by 41 (0 self) - Add to MetaCart
Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks

by unknown authors , 2009
"... During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located betwee ..."
Abstract - Add to MetaCart
between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a

prevent

by Chong Hee Kim, Gildas Avoine, Université Catholique De Louvain
"... distance bounding protocol with mixed challenges to ..."
Abstract - Add to MetaCart
distance bounding protocol with mixed challenges to

Challenges in Distance-Bounding

by Ioana Boureanu, Serge Vaudenay
"... Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use ..."
Abstract - Add to MetaCart
of distance-bounding protocols. In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations. We focus on their security, but we also explore the difficulties encountered in their design and implementation. Moreover, we present our vision

Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System

by Mohammad Arjmand , Mahmoud Gardeshi , Reza Taheri Zohur , Mohammad Kazemi
"... ABSTRACT The most important characteristic of RFID-based ..."
Abstract - Add to MetaCart
ABSTRACT The most important characteristic of RFID-based
Next 10 →
Results 1 - 10 of 70
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University