Filters








400 Hits in 8.9 sec

A Survey on Context-based Co-presence Detection Techniques [article]

Mauro Conti, Chhagan Lal
2019 arXiv   pre-print
These techniques are heavily used for improving security and usability in Zero-Interaction based Co-presence Detection and Authentication (ZICDA) systems.  ...  during the proximity verification process.  ...  These applications use contactless authentication along with the proximity verification between the communicating devices for ensuring secure access control.  ... 
arXiv:1808.03320v2 fatcat:4fgrtt5n7veahmfxswidkav2se

A mobile contactless point of sale enhanced by the NFC and biometric technologies

Vincent Alimi, Christophe Rosenberger, Sylvain Vernois
2013 International Journal of Internet Technology and Secured Transactions  
As an illustration, ISO 14443 is used for contactless payment and transit smart cards and ISO 15693 for contactless access control smart cards.  ...  The NFC controller, also referred to as contactless frontend (CLF) within ETSI, is responsible for the analogue/digital conversion of the signals transferred over the proximity connection.  ... 
doi:10.1504/ijitst.2013.058291 fatcat:dgu4a2xmarfp7bhtg5cr23rttm

An NFC Relay Attack with Off-the-shelf Hardware and Software [chapter]

Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller
2016 Lecture Notes in Computer Science  
There are three different authentication methods for EMV cards, Static Data Authentication (SDA), Dynamic Data Authentication (DDA) and Combined Data Authentication (CDA) [3] .  ...  The reading device is called Proximity Coupling Device (PCD) and the card is referred to as Proximity Integrated Circuit Card (PICC).  ... 
doi:10.1007/978-3-319-39814-3_8 fatcat:wzdf3kvnknbljhslhgcefyscqe

Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack [article]

Michael Roland
2013 arXiv   pre-print
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how these relay attacks can be applied to the Google Wallet.  ...  Finally, it gives an overview of the components and results of a successful attempt to relay an EMV Mag-Stripe transaction between a Google Wallet device and an external card emulator over a wireless network  ...  At the same time, the card emulator is brought into proximity of a reader device (POS terminal, access control reader...)  ... 
arXiv:1209.0875v2 fatcat:6da6kjd7cfb7fn65hg3i4xpwyy

A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards

M. Henzl, P. Hanacek
2016 Radioengineering  
He concerns with information system security, risk analysis, applied cryptography, and electronic payment systems for more than ten years.  ...  We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking.  ...  Acknowledgments The research has been supported by the EU/Czech IT4Innovations Centre of Excellence project CZ.1.05/1.1.00/02.0070 and the internal BUT project FIT-S-14-2486.  ... 
doi:10.13164/re.2016.0132 fatcat:thrgbygubzexldrco4dkk7xgdm

A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

Lishoy Francis, Gerhard Hancke, Keith Mayes
2013 International Journal of RFID Security and Cryptography  
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems.  ...  This implementation reduces the complexity of relay attacks and therefore has potential security implications for current contactless systems. We also discuss countermeasures to mitigate the attack.  ...  We would like to thank Giesecke & Devrient (GmbH) and Comprion (GmbH) for providing equipment support. We would also like to thank secunet Security Networks AG for providing eMRTD reader software.  ... 
doi:10.20533/ijrfidsc.2046.3715.2013.0012 fatcat:gfqqtgsmdrh4lnz7t4mm77l52y

Guaranteeing the Authenticity of Location Information

Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho
2008 IEEE pervasive computing  
- based) Distance bound Distance-bounding protocols 2 toA* (round trip) 1 Contactless access-control cards Signals with light- propagation speed Secure and private proofs of location  ...  We call the adversary external if the nodes under the attacker's control can't authenticate correctly to other nodes in the system.  ... 
doi:10.1109/mprv.2008.49 fatcat:6zmlj4ufyfdjdfofqp6mpcu7nq

Addressing NFC Mobile Relay Attacks: NFC User Key Confirmation Protocols

Ali Alshehri, Steve Schneider
2014 International Journal of RFID Security and Cryptography  
For proximity proof, the solution is intended for addressing external attackers and for the assumption that the users are honest.  ...  The key confirmation protocol would be a shared mission between the cryptographic protocol and the end user. The UKC protocols address both entity authentication and proximity proof requirements.  ...  Proximity proof addresses only external intruders, and controlling internal attacks can be done through the system policy, for example a penalty or prevention from using the system.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0016 fatcat:iir4ggtu5bbkvjj33j6hijzjia

Confidence in smart token proximity: Relay attacks revisited

G.P. Hancke, K.E. Mayes, K. Markantonakis
2009 Computers & security  
Contactless and contact smart card systems use the physical constraints of the communication channel to implicitly prove the proximity of a token.  ...  Finally, we evaluate the effectiveness of time-out constraints, distance bounding and the use of a additional verification techniques for making systems relay-resistant and explain the challenges still  ...  For example, an access control system will open a door and a vending machine will dispense an item if presented with what it perceives to be a valid token in close proximity.  ... 
doi:10.1016/j.cose.2009.06.001 fatcat:odt7t45qerhelmk3ph2qgthche

Biometrics and Smart Cards in Identity Management [chapter]

Bart Jacobs, Erik Poll
2011 Information Technology and Law Series  
The RFID cards in e-passports are so-called proximity cards, which implement ISO 14443 standard. Proximity cards are widely used for access control to buildings and public transport.  ...  For example, the US government issues PIV (Personal Identity Verification) smartcards to all government personnel to control physical access to buildings and access to computers and information services  ... 
doi:10.1007/978-90-6704-731-9_23 fatcat:rjdn4mepqve4rpv6vxszc6v6ti

Security Analysis of Near-Field Communication (NFC) Payments [article]

Dennis Giese, Kevin Liu, Michael Sun, Tahin Syed, Linda Zhang
2019 arXiv   pre-print
Near-Field Communication (NFC) is a modern technology for short range communication with a variety of applications ranging from physical access control to contactless payments.  ...  We evaluate our methods on our personal Apple and Google Pay accounts and demonstrate two successful attacks on these NFC payment systems.  ...  Baseline Payment Technologies To establish a baseline, we begin with an overview of past technologies used for payment, identification, and access control and the security properties of each.  ... 
arXiv:1904.10623v1 fatcat:eylmujomvjfnrc5z5lbm32e3oy

Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones [chapter]

Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010 Lecture Notes in Computer Science  
The attack does not need to access secure program memory nor use any code signing, and can use publicly available APIs.  ...  Peer-to-peer applications for mobile devices are receiving increased interest and in some cases these services are relying on NFC communication.  ...  NFC also allows for devices to interact with existing contactless/RFID (Radio Frequency Identification) systems.  ... 
doi:10.1007/978-3-642-16822-2_4 fatcat:s5uubfduczednfzavflmr5xgre

Smart keys for cyber-cars

Christoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudié, Majid Sobhani, Ahmad-Reza Sadeghi
2013 Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13  
An emerging trend is the integration of smartphones into automotive systems and applications, particularly access control systems to unlock cars (doors and immobilizers).  ...  Our generic security architecture protects the electronic access tokens on the smartphone and provides advanced features such as context-aware access policies, remote issuing and revocation of access rights  ...  possibilities for smartphones, including electronic ticketing [1] , payment [27] and access control [46, 22] .  ... 
doi:10.1145/2435349.2435382 dblp:conf/codaspy/BusoldTWDSSS13 fatcat:voqekmljrbc5hg53pkmdvfrycq

NFC Hardware Device Based Access Control System using Information Hiding

Snehal Muke, Shubhangi Shinde, Chetana Mistry, Prof. Prashant Jawalkar B
2015 IJIREEICE  
It will control one door in a single room or many arrivals in an entire building. This is truly the best way to limit or control access to certain areas and know who has been where and when.  ...  It is introduced as an alternative system to the most common access control system using physical keys, mechanical locks, digital keypads, digital access cards, biometric access control to increase the  ...  The access passcode within the access card is then transmitted to an access control system for verification.  ... 
doi:10.17148/ijireeice.2015.31016 fatcat:drsi4gipinavdgvsipkvc6ybwm

User Behavior Based Enhanced Protocol (Ubep) For Secure Near Field Communication

Vinay Gautam, Vivek Gautam
2014 Zenodo  
These factors can be same for a user during interaction with the system. The UBEP uses two phase user verification system to authenticate a user.  ...  The second phase (recognition) uses analysis of current and previous scenario of user interaction and digital signature verification system to finally authenticate user.  ...  The UBEP uses two phase user verification system to authenticate a user.  ... 
doi:10.5281/zenodo.1336564 fatcat:qxghaukdjbbyrgir2al4fumxpi
« Previous Showing results 1 — 15 out of 400 results