نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

Journal: :IEEE Security & Privacy 2015

Journal: :IACR Cryptology ePrint Archive 2011
Süleyman Kardas Mehmet Sabir Kiraz Muhammed Ali Bingöl Hüseyin Demirci

Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-res...

Journal: :Future Generation Comp. Syst. 2018
Elena Pagnin Anjia Yang Qiao Hu Gerhard P. Hancke Aikaterini Mitrokotsa

Authentication for resource-constrained devices is seen as one of themajor challenges in current wireless communication networks. The HB protocol by Juels and Weis provides device authentication based on the learning parity with noise (LPN) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work ha...

Journal: :I. J. Network Security 2016
Adarsh Kumar Krishna Gopal Alok Aggarwal

Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...

Journal: :IACR Cryptology ePrint Archive 2013
Aikaterini Mitrokotsa Cristina Onete Serge Vaudenay

In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g., in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeas...

Journal: :IACR Cryptology ePrint Archive 2016
Mathilde Igier Serge Vaudenay

Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...

2013
Ioana Boureanu Aikaterini Mitrokotsa Serge Vaudenay

Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical threats posed in their context. Moreover, in distancebounding, some subtle security shortcomings related to the PRF (pseudorandom function) ass...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2016

Journal: :IACR Cryptology ePrint Archive 2009
Gildas Avoine Muhammed Ali Bingöl Süleyman Kardaş Cédric Lauradoux Benjamin Martin

Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze and design new distance bounding protocols. We first formalize the adversary scenarios, the protocol mean...

Journal: :IACR Cryptology ePrint Archive 2013
Ioana Boureanu Aikaterini Mitrokotsa Serge Vaudenay

Distance-bounding is a practical solution to be used in security-sensitive contexts, to prevent relay attacks. Its applied cryptographic role is definitely spreading fast and it is clearly far reaching, extending from contactless payments to remote car unlocking. However, security models for distance-bounding are not well-established and, as far as we know, no existing protocol is proven to res...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید