نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

2009
Pedro Peris-Lopez Julio C. Hernandez-Castro Christos Dimitrakakis Aikaterini Mitrokotsa Juan M. E. Tapiador

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...

Journal: :Journal of Computer Security 2011
Gildas Avoine Muhammed Ali Bingöl Süleyman Kardas Cédric Lauradoux Benjamin Martin

Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we introduce a unified framework that aims to improve analysis and design of distance bounding protocols. Our framework includes a thorough termi...

2011
Cas Cremers Kasper B. Rasmussen Srdjan Čapkun

Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on its distance to another device (the prover) [1]. A number of distance bounding protocols were proposed in recent years, which provide different performance and security guarantees. So far, several distance-bounding protocols were implemented, some using digital processing and short symbols, whereas...

2013
Ioana Boureanu Aikaterini Mitrokotsa Serge Vaudenay

Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers’ outputs have recently been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorp...

Journal: :CoRR 2009
Sreekanth Malladi Bezawada Bruhadeshwar Kishore Kothapalli

Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. This typically involves sending a request by one node to another node, receiving a response, and then calculating an upper bound on the distance by multiplying the round-trip time with the velocity of the signal. However, dishonest nodes in the network can tur...

2007
Dave Singelée Bart Preneel

Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, in which a local impersonator exploits a remote honest user. Hancke and Kuhn have proposed a solution to cope with noisy channels...

2012
Aikaterini Mitrokotsa Cristina Onete Serge Vaudenay

At ACM CCS 2008, Rasmussen and Čapkun introduced a distance-bounding protocol [22] (henceforth RČ protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden marker) and receiving the response. Thus, the verifier is able to compute an upper bound on the distance separating it and the prover. Distanc...

Journal: :IACR Cryptology ePrint Archive 2011
Long H. Nguyen

We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels in a distance-bounding protocol. The optimal threshold will ensure that even if an intruder attempts to cause incorrect authentication, the expected loss the verifier suffers will still be lower than when the intruder do...

Journal: :CoRR 2012
Yue Wang

Network calculus is a powerful methodology of characterizing queueing processes and has wide applications, but few works on applying it to 802.11 by far. In this paper, we take one of the first steps to analyze the backlog bounds of an 802.11 wireless LAN using stochastic network calculus. In particular, we want to address its effectiveness on bounding backlogs. We model a wireless node as a si...

Journal: :ACM Computing Surveys 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید