메뉴 건너뛰기




Volumn 10, Issue 5, 2011, Pages 1618-1626

RFID distance bounding protocols with mixed challenges

Author keywords

authentication; distance bounding protocol; distance fraud; relay attack; RFID

Indexed keywords

DISTANCE BOUNDING; DISTANCE FRAUD; LOCATION BASED; MAFIA FRAUD; RELAY ATTACK; RFID; RFID SYSTEMS; ROUND-TRIP TIME;

EID: 79957663054     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2011.030411.101158     Document Type: Article
Times cited : (48)

References (19)
  • 2
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • Springer
    • G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement," in Proc. 12th Inf. Security Conf. 2009, vol. 5735 of Lecture Notes Comput. Science, pp. 250-261. Springer, 2009.
    • (2009) Proc. 12th Inf. Security Conf. 2009 5735 of Lecture Notes Comput. Science , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 5
    • 84885078444 scopus 로고    scopus 로고
    • Distance-bounding proof of knowledge to avoid real-time attacks
    • Springer- Verlag
    • L. Bussard and W. Bagga, "Distance-bounding proof of knowledge to avoid real-time attacks," IFIP International Federation for Information Processing, vol. 181, pp. 223-238. Springer-Verlag, 2005.
    • (2005) IFIP International Federation for Information Processing , vol.181 , pp. 223-238
    • Bussard, L.1    Bagga, W.2
  • 6
    • 35048883388 scopus 로고    scopus 로고
    • Embedding distance-bounding protocols within intuitive interactions
    • of Lecture Notes in Computer Science, Springer-Verlag
    • L. Bussard and Y. Roudier, "Embedding distance-bounding protocols within intuitive interactions," Security in Pervasive Computing - SPC, vol. 2802 of Lecture Notes in Computer Science, pp. 119-142. Springer- Verlag, 2003.
    • (2003) Security in Pervasive Computing - SPC , vol.2802 , pp. 119-142
    • Bussard, L.1    Roudier, Y.2
  • 7
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. INFOCOM, pp. 1917-1928.
    • Proc. INFOCOM , pp. 1917-1928
    • Capkun, S.1    Hubaux, J.-P.2
  • 9
    • 0013398251 scopus 로고    scopus 로고
    • Major security problems with the "unforgeable" (Feige)- Fiat-Shamir proofs of identiy and how to overcome them
    • Y. Desmedt, "Major security problems with the " Unforgeable" (Feige)- Fiat-Shamir proofs of identiy and how to overcome them," in Proc. SecuriCom '88, pp. 15-17.
    • Proc. SecuriCom , vol.88 , pp. 15-17
    • Desmedt, Y.1
  • 11
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smarcard relay attacks
    • S. Drimer and S. J. Murdoch, "Keep your enemies close: distance bounding against smarcard relay attacks," in Proc. 16th USENIX Security Sympositum, pp. 1-16, 2007.
    • (2007) Proc. 16th USENIX Security Sympositum , pp. 1-16
    • Drimer, S.1    Murdoch, S.J.2
  • 14
    • 71549138804 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • of Lecture Notes in Computer Science
    • C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks," in Proc. 8th International Conference on Cryptology and Network Security 2009, vol. 5888 of Lecture Notes in Computer Science, pp. 119-133. Springer, 2009.
    • (2009) Proc. 8th International Conference on Cryptology and Network Security 2009 , vol.5888 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 16
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • Published online: Jan 17 2008; an extended abstract appears in [15]
    • J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels," Wireless Commun. Mobile Comput., 2008. Published online: Jan 17 2008; an extended abstract appears in [15].
    • (2008) Wireless Commun. Mobile Comput.
    • Munilla, J.1    Peinado, A.2
  • 17
    • 38149028509 scopus 로고    scopus 로고
    • Distance bounding in noisy environments
    • of Lecture Notes in Computer Science, Springer
    • D. Singelée and B. Preneel, "Distance bounding in noisy environments," in Proc. Security and Privacy in Ad-hoc and Sensor Networks 2007, vol. 4572 of Lecture Notes in Computer Science, pp. 101-115. Springer, 2007.
    • (2007) Proc. Security and Privacy in Ad-hoc and Sensor Networks 2007 , vol.4572 , pp. 101-115
    • Singelée, D.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.