A Distance Bounding Protocol for Location-Cloaked Applications
نویسندگان
چکیده
منابع مشابه
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-known distance-bounding protocols. These protocols are usually designed to resist to only one of these frauds, though, behave poorly when both are considered. In this paper (i) we extend the analysis of mafia and distan...
متن کاملAn Ultra-lightweight RFID Distance Bounding Protocol
Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...
متن کاملThe Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the verifier and an out-of-field prover. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short aut...
متن کاملEfficient Public-Key Distance Bounding Protocol
Distance bounding protocols become more and more important because they are the most accurate solution to defeat relay attacks. They consist of two parties: a verifier and a prover. The prover shows that (s)he is close enough to the verifier. In some applications such as payment systems, using public-key distance bounding protocols is practical as no pre-shared secret is necessary between the p...
متن کاملYet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new protocols have been proposed the last five
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2018
ISSN: 1424-8220
DOI: 10.3390/s18051337