[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gerault et al., 2019 - Google Patents

Distance bounding under different assumptions: opinion

Gerault et al., 2019

View PDF
Document ID
12735955695732065704
Author
Gerault D
Boureanu I
Publication year
Publication venue
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks

External Links

Snippet

Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which an adversary fraudulently forwards the communication between a verifier and a distant prover. In the more than 40 different protocols that followed, assumptions were taken …
Continue reading at openresearch.surrey.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Mitrokotsa et al. Classifying RFID attacks and defenses
Kardaş et al. A novel RFID distance bounding protocol based on physically unclonable functions
Heydt-Benjamin et al. Privacy for public transportation
Urien et al. Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
Chen et al. An ownership transfer scheme using mobile RFIDs
Alagheband et al. Unified privacy analysis of new‐found RFID authentication protocols
Munilla et al. Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
Avoine et al. From relay attacks to distance-bounding protocols
Jannati Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
Tu et al. Lightweight non-distance-bounding means to address RFID relay attacks
Sakiyama et al. Physical authentication using side-channel information
Gerault et al. Distance bounding under different assumptions: opinion
Kapoor et al. Distance bounding protocol for multiple RFID tag authentication
Zhuang et al. Energy-efficient distance-bounding with residual charge computation
Liu et al. Inductive method for evaluating RFID security protocols
Nisar Location based authentication service using 4G/5G Devices
Xu et al. Novel implementation of defence strategy of relay attack based on cloud in RFID systems
Alshehri et al. A formal framework for security analysis of NFC mobile coupon protocols
Munilla et al. Enhanced ownership transfer protocol for RFID in an extended communication model
Wu et al. RFID System Security
Xin et al. A distance bounding protocol using error state and punishment
Rad et al. Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
Hindarsih et al. Access control prototype using modified rap-wota with timestamp protocol based on arduino mega 2560