Filters








81 Hits in 3.2 sec

An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks [article]

Gildas Avoine, Aslan Tchamkerten
2008 arXiv   pre-print
We present an authentication protocol suited for RFID systems.  ...  Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover.  ...  All current authentication protocols that prevent relay attacks perform rather poorly against an adversary that does not relay messages.  ... 
arXiv:0809.4183v1 fatcat:h6pszhioc5b2tivajzug4z7tku

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
2015 Journal of Computer Security  
This paper describes a framework enabling an expected loss analysis for all the protocols in this family.  ...  Computationally simple methods to obtain nearly optimal values for the threshold, as well as for the number of rounds are suggested and upper bounds on the expected loss, holding uniformly, are given.  ...  These protocols are known as distance-bounding protocols and are employed as the main countermeasure against relay attacks by timing transmission delays.  ... 
doi:10.3233/jcs-140521 fatcat:gigj77rowncfner3kmotsv6kmq

Comparing distance bounding protocols: A critical mission supported by decision theory

Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua
2015 Computer Communications  
Distance bounding protocols are security countermeasures designed to thwart relay attacks.  ...  Although distance bounding protocols have existed since the early nineties, this research topic resurrected with the deployment of contactless systems, against which relay attacks are particularly impactful  ...  Introduction Distance bounding protocols are the most popular countermeasures against relay attacks.  ... 
doi:10.1016/j.comcom.2015.06.007 fatcat:nliomyu4mzar5jmpmeasighcvy

From Relay Attacks to Distance-Bounding Protocols [chapter]

Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete
2021 Security of Ubiquitous Computing Systems  
We give details on relaying mechanisms, we review canonical distance-bounding protocols, as well as their threat-model (i.e., covering attacks beyond relaying) stemming from the authentication dimension  ...  AbstractWe present the concept of relay attacks, and discuss distance-bounding schemes as the main countermeasure.  ...  Purpose-Built Relays There are several relay-attack implementations against radio frequency identification (RFID) systems using purpose-built attack proxies and relay links, which incur minimal delay in  ... 
doi:10.1007/978-3-030-10591-4_7 fatcat:uuq4ffyrxba2fljqxpe46c7iju

Robust, anonymous RFID authentication with constant key-lookup

Mike Burmester, Breno de Medeiros, Rossana Motta
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
In particular, we seek to reduce the complexity of identifying tags by the back-end server in anonymous RFID authentication protocols-what we term the key-lookup problem.  ...  We propose a compiler that transforms a generic RFID authentication protocol (supporting anonymity) into one that achieves the same guarantees with constant key-lookup cost even when the number of tags  ...  There are several attack strategies against RFID systems that target availability.  ... 
doi:10.1145/1368310.1368351 dblp:conf/ccs/BurmesterMM08 fatcat:ukn6ksdarffdblge4dvjq76jta

MAP: Towards Authentication for Multiple Tags

Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu, Shan Chang, Jianfeng Ma
2013 International Journal of Distributed Sensor Networks  
In this paper, we propose an efficient authentication protocol, which leverages the collaboration among multiple tags for accelerating the authentication speed.  ...  The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authentication (PPA) protocols to prevent privacy leakage during authentication.  ...  This kind of attack is a new general attack which can even break the privacy of proven private RFID authentication protocols. MAP can defend against such attack.  ... 
doi:10.1155/2013/109439 fatcat:po7f7kpbkrd2xnwgya2jaxs2im

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2018 IEEE Access  
The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized.  ...  In [61] , two relay selection protocols, namely optimal relay selection (ORS) and partial relay selection (PRS), are proposed to secure an energy harvesting relay system in 5G wireless networks.  ...  The analytical and asymptotic expressions of secrecy outage probability for both relay selections protocols are presented.  ... 
doi:10.1109/access.2017.2779146 fatcat:yjroccchnbbzbmmlmug4q7ge4q

Large-Scale Wireless-Powered Networks with Backscatter Communications – A Comprehensive Survey

Fatemeh Rezaei, Chintha Tellambura, Sanjeewa Herath
2020 IEEE Open Journal of the Communications Society  
The problem of the double near-far phenomenon has been attacked in [12] , [20], [21] .  ...  For instance, with the HTT protocol, by wireless energy transfer in the downlink and wireless information transmission in the uplink, we find the doubly near-far problem; i.e., the user located near the  ...  Moreover, typical security solutions such as encryption, which provide an acceptable level of security against a number of attacks, cannot fully satisfy all the requirements of resource-constrained backscatter  ... 
doi:10.1109/ojcoms.2020.3012466 fatcat:jlsmjscegzcb5kutdh4lna6khu

Breaking and fixing the HB+DB protocol

Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '17  
Secondly, we describe an effective MiM attack against HB+DB: our attack refines the GRS-strategy and still leads to key-recovery by the attacker, yet this is not deterred by HB+DB's distancebounding.  ...  At WiSec 2015, Pagnin et al. proposed the HB+DB protocol: HB + with an additional distance-bounding dimension added to detect and counteract such MiM attacks.  ...  Notably, DB protocols also thwart relay attacks, consisting of the exact forwarding of messages between an honest prover and an honest verifier.  ... 
doi:10.1145/3098243.3098263 dblp:conf/wisec/BoureanuG0O17 fatcat:ie6gcjfi7ng2havps3dzmfo2fi

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Muhammad Rizwan Ghori, Tat-Chee Wan, Gian Chand Sodhy
2020 Sensors  
The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue.  ...  Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits.  ...  Better overall network performance was achieved while using fewer relay nodes; hence, optimal relay node selection is critical.  ... 
doi:10.3390/s20123590 pmid:32630381 fatcat:etgiftcnlzhvznpyrjrkpcmuze

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2020 arXiv   pre-print
Despite the undeniable management advantages, the intermittent availability of the energy source and the limited power supply has led to challenging system trade-offs, resulting in an increased attack  ...  We explore the vulnerabilities of EH networks, and we provide a comprehensive overview of the scientific literature, including attack vectors, cryptography techniques, physical-layer security schemes for  ...  In the context of overlay CRNs, the authors in [139] proposed optimal relay selection (ORS) strategies assuming both the time switching relay (TSR) protocol and power splitting relay (PSR) protocol.  ... 
arXiv:2004.10394v2 fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je

Physical Layer Security: A Paradigm Shift in Data Confidentiality [chapter]

Arsenia Chorti, Camilla Hollanti, Jean-Claude Belfiore, Harold Vincent Poor
2015 Lecture Notes in Electrical Engineering  
to an eavesdropper by using appropriate encoding schemes that exploit the noise and fading effects of wireless communication channels.  ...  In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect  ...  Use of PLS technologies against active eavesdroppers PLS techniques have been investigated for their potential use against various types of active attacks [36] .  ... 
doi:10.1007/978-3-319-23609-4_1 fatcat:t3hwjd6kqjasli74zj7s6rxcbe

Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien, Qi Jiang
2021 Wireless Communications and Mobile Computing  
We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results.  ...  Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques.  ...  Thus, MANA IV is considered, based on the definition provided by the original work, asymptotically optimal in terms of security 3.2.6. SAS-Based Cross-Authentication Protocol (4) Protocol Steps.  ... 
doi:10.1155/2021/8887472 fatcat:opktciso2ncynne2qutnuubleq

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control [chapter]

Paolo D'Arco
2011 Lecture Notes in Computer Science  
an adversary attack.  ...  In this paper we propose an efficient forward-private RFID mutual authentication protocol. The protocol is secure under standard assumptions.  ...  An Rfid authentication protocol is said to be (q, T, )-secure (w.r.t. tag authentication/w.r.t. reader authentication) iff, for any (q, T )-adversary, the probability that an impersonation attack is successful  ... 
doi:10.1007/978-3-642-21040-2_5 fatcat:s5zkbolefjgg3mym67pqoqatxu

A Class of Precomputation-Based Distance-Bounding Protocols

Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2016 2016 IEEE European Symposium on Security and Privacy (EuroS&P)  
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay attacks.  ...  By designing an abstract model for these protocols, we can study their generic properties, such as security lower bounds in relation to space complexity.  ...  Perhaps, the most popular and devastating of such attacks is mafia fraud [2] , also known as relay attack [3] .  ... 
doi:10.1109/eurosp.2016.19 dblp:conf/eurosp/MauwTT16 fatcat:djajny66crg3zmatc4dkof5udu
« Previous Showing results 1 — 15 out of 81 results