Gerault et al., 2019 - Google Patents
Distance bounding under different assumptions: opinionGerault et al., 2019
View PDF- Document ID
- 12735955695732065704
- Author
- Gerault D
- Boureanu I
- Publication year
- Publication venue
- Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
External Links
Snippet
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which an adversary fraudulently forwards the communication between a verifier and a distant prover. In the more than 40 different protocols that followed, assumptions were taken …
- 238000004891 communication 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Mitrokotsa et al. | Classifying RFID attacks and defenses | |
Kardaş et al. | A novel RFID distance bounding protocol based on physically unclonable functions | |
Heydt-Benjamin et al. | Privacy for public transportation | |
Urien et al. | Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
Alagheband et al. | Unified privacy analysis of new‐found RFID authentication protocols | |
Munilla et al. | Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme | |
Avoine et al. | From relay attacks to distance-bounding protocols | |
Jannati | Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems | |
Tu et al. | Lightweight non-distance-bounding means to address RFID relay attacks | |
Sakiyama et al. | Physical authentication using side-channel information | |
Gerault et al. | Distance bounding under different assumptions: opinion | |
Kapoor et al. | Distance bounding protocol for multiple RFID tag authentication | |
Zhuang et al. | Energy-efficient distance-bounding with residual charge computation | |
Liu et al. | Inductive method for evaluating RFID security protocols | |
Nisar | Location based authentication service using 4G/5G Devices | |
Xu et al. | Novel implementation of defence strategy of relay attack based on cloud in RFID systems | |
Alshehri et al. | A formal framework for security analysis of NFC mobile coupon protocols | |
Munilla et al. | Enhanced ownership transfer protocol for RFID in an extended communication model | |
Wu et al. | RFID System Security | |
Xin et al. | A distance bounding protocol using error state and punishment | |
Rad et al. | Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols | |
Hindarsih et al. | Access control prototype using modified rap-wota with timestamp protocol based on arduino mega 2560 |