Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
نویسندگان
چکیده
As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counterfeit terminal such that the diamond purchasing transaction is placed on Alice’s card. The PIN entered by Alice is recorded by the counterfeit terminal and is sent, via a laptop and wireless headset, to Carol who enters it into the genuine terminal when asked. The result is that the crooks have paid for a diamond ring using Alice’s money, who got her meal for free, but will be surprised when her bank statement arrives.
منابع مشابه
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...
متن کاملTowards Secure Distance Bounding
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce t...
متن کاملProviding a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System
The most important characteristic of RFID-based electronic voting system compared to traditional voting system is that votes in the electronic system are as contactless smart cards in place of paper ballots. For casting ballots, voters use a computer terminal to write their choices (their chosen candidates) into contactless smart cards and then put the smart card inside the box. The most import...
متن کاملAttacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is proposed. In this letter, we show that the proof that is generated by the proposed GBDP protocol does not actually prove anything. Furthermore, we provide a construction towards a distance-bounding ...
متن کاملMaa Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, maa fraud and terrorist fraud attacks. Reid et al. proposed the rst symmetric key distance bounding protocol against maa and terrorist fraud attacks [1]. However, [2] claims that this is only achieved with a (7/8) probability of success for maa fraud, rather than the theoretical value...
متن کامل