Make noise and whisper: a solution to relay attacks
نویسندگان
چکیده
In this paper we propose a new method to detect relay attacks. The relay attacks are possible in many communication systems, and are easy to put in practice since the attackers don't require any knowledge about the underlying protocols or the cryptographic keys. So far the most practical solutions against relay attacks seem to rely on distance-bounding protocols. These protocols can provide an estimated maximum distance between two communicating devices. We provide a solution that can detect a relay attack regardless of the distance between devices. Our solution relies on introducing intentional errors in the communication, providing a kind of hop-count metric. In order to show the applicability of our idea we provide two example implementations based on bidirectional communication channels. There are a few limitations in these implementations but we hope our ideas will contribute towards better and more practical implementations against relay attacks.
منابع مشابه
Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)
In this paper we propose a new method to detect relay attacks. The relay attacks are possible in many communication systems, and are easy to put in practice since the attackers don’t require any knowledge about the underlying protocols or the cryptographic keys. So far the most practical solutions against relay attacks rely on distancebounding protocols. These protocols can provide an estimated...
متن کاملSum-Rate Maximization Based on Power Constraints for Cooperative AF Relay Networks
In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...
متن کاملRelay Cost Bounding for Contactless EMV Payments
This paper looks at relay attacks against contactless payment cards, which could be used to wirelessly pickpocket money from victims. We discuss the two leading contactless EMV payment protocols (Visa’s payWave and MasterCard’s PayPass). Stopping a relay attack against cards using these protocols is hard: either the overhead of the communication is low compared to the (cryptographic) computatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011