Results 1 - 10
of
70
RFID distance bounding protocol with mixed challenges to prevent relay attacks.
- In The 8th International Conference on Cryptology And Network Security, CANS
, 2009
"... Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in ..."
Abstract
-
Cited by 23 (2 self)
- Add to MetaCart
-in-themiddle who relays the signal between the two entities, possibly without knowing the specifications of the protocol used on the channel. Recently, distance bounding protocols measuring the round-trip times of messages exchanged between the reader and the tag have been designed to prevent this attack. Almost
The Swiss-Knife RFID Distance Bounding Protocol
- In ICISC (2008
"... Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance boundin ..."
Abstract
-
Cited by 37 (1 self)
- Add to MetaCart
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance
Multichannel protocols to prevent relay attacks
, 2009
"... A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encrypting the communication between the honest endpoints does not protect against such attacks. The main solution that has ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
been offered to date is distance bounding, in which a tightly timed exchange of challenges and responses persuades the verifier that the prover cannot be further away than a certain distance. This solution, however, still won't say whether the specific endpoint the verifier is talking
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
, 2010
"... The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prov ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last
A formal approach to distance-bounding RFID protocols
- In Information Security Conference (ISC) 2011, LNCS
, 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different
Detecting Relay Attacks with Timing-Based Protocols
- Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, 2007
"... Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks pres ..."
Abstract
-
Cited by 41 (0 self)
- Add to MetaCart
Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
, 2009
"... During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located betwee ..."
Abstract
- Add to MetaCart
between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a
Challenges in Distance-Bounding
"... Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use ..."
Abstract
- Add to MetaCart
of distance-bounding protocols. In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations. We focus on their security, but we also explore the difficulties encountered in their design and implementation. Moreover, we present our vision
Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System
"... ABSTRACT The most important characteristic of RFID-based ..."
Results 1 - 10
of
70