메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 877-887

Design of a secure distance-bounding channel for RFID

Author keywords

Contactless smart card; Distance bounding; RFID

Indexed keywords

CHANNEL DESIGN; COMMUNICATION CHANNEL; CONTACTLESS SMART CARD; DISTANCE BOUNDING; IDENTIFICATION SYSTEMS; NEAR-FIELD; PROOF OF CONCEPT; RELAY ATTACK; RESOURCE-CONSTRAINED; RFID; RFID SYSTEMS;

EID: 79952438809     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.04.014     Document Type: Article
Times cited : (48)

References (35)
  • 1
    • 17644398259 scopus 로고    scopus 로고
    • Secure object identification - Or: Solving the chess grandmaster problem
    • Proceedings New Security Paradigms Workshop, NSPW 2003
    • A. Alkassar, C. Stuble, and A. Sadeghi Secure object identification: or solving the chess grandmaster problem Proceedings of new security paradigms workshop 2003 77 85 (Pubitemid 40557284)
    • (2004) Proceedings New Security Paradigms Workshop , pp. 77-85
    • Alkassar, A.1    Stable, C.2    Sadeghi, A.-R.3
  • 8
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
    • Y. Desmedt Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them Proceedings of SecuriCom 88 1988 15 17
    • (1988) Proceedings of SecuriCom 88 , pp. 15-17
    • Desmedt, Y.1
  • 10
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • S. Drimer, and S.J. Murdoch Keep your enemies close: distance bounding against smartcard relay attacks Proceeding USENIX security symposium August 2007 87 102
    • (2007) Proceeding USENIX Security Symposium , pp. 87-102
    • Drimer, S.1    Murdoch, S.J.2
  • 15
    • 70349451691 scopus 로고    scopus 로고
    • Confidence in smart token proximity: Relay attacks revisited
    • Hancke GP, Mayes K, Markantonakis K. Confidence in smart token proximity: relay attacks revisited. Computers and Security 2009;28(7):61527
    • (2009) Computers and Security , vol.28 , Issue.7 , pp. 615-627
    • Hancke, G.P.1    Mayes, K.2    Markantonakis, K.3
  • 17
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.C. Hu, A. Perrig, and D.B. Johnson Packet leashes: a defense against wormhole attacks in wireless networks Proceedings of INFOCOM April 2003 1976 1986
    • (2003) Proceedings of INFOCOM , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 23
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void challenges and analysis in noisy channels
    • J. Munilla, and A. Peinado Distance bounding protocols for RFID enhanced by using void challenges and analysis in noisy channels Wireless Communications and Mobile Computing 8 2008 1227 1232
    • (2008) Wireless Communications and Mobile Computing , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 26
    • 51349157157 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • K.B. Rasmussen, and S. Čapkun Implications of radio fingerprinting on the security of sensor networks Proceedings of IEEE SecureComm 2007
    • (2007) Proceedings of IEEE SecureComm
    • Rasmussen, K.B.1    Čapkun, S.2
  • 29
    • 79952441218 scopus 로고    scopus 로고
    • Why legacy payment schemes are inadequate for mass transit
    • March . Cited 28 March 2010
    • Sheehan C. Why legacy payment schemes are inadequate for mass transit. Contactless News, March 2010. Cited 28 March 2010: 〈 http://www. contactlessnews.com/2010/03/23/why-legacy-payment-schemes-are-inadequate-for- mass-transit 〉.
    • (2010) Contactless News
    • Sheehan, C.1
  • 30
    • 36249008630 scopus 로고    scopus 로고
    • Distance-bounding based defense against relay attacks in wireless networks
    • DOI 10.1109/TWC.2007.060183
    • C. Tang, and D.O. Wu Distance-bounding based defense against relay attacks in wireless networks IEEE Transactions on Wireless Communications 6 11 2007 4071 4078 (Pubitemid 350121756)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.11 , pp. 4071-4078
    • Tang, C.1    Wu, D.O.2
  • 33
    • 79952437916 scopus 로고    scopus 로고
    • Ubisense. White papers and datasheets, 2003-2006
    • Ubisense. White papers and datasheets, 20032006 〈 http://www.ubisense.net 〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.