메뉴 건너뛰기




Volumn , Issue , 2012, Pages 113-127

Distance hijacking attacks on distance bounding protocols

Author keywords

attacks; Distance bounding; formal model; formal verification; hijacking; location verification; multi prover environment; position verification

Indexed keywords

TERRORISM;

EID: 84868335627     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.17     Document Type: Conference Paper
Times cited : (126)

References (30)
  • 4
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Advances in Cryptology - EUROCRYPT '93, Springer
    • S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology - EUROCRYPT '93, volume 765 of LNCS, pages 344-359. Springer, 1994.
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 5
    • 84885078444 scopus 로고    scopus 로고
    • Distance-bounding proof of knowledge to avoid real-time attacks
    • Security and Privacy in the Age of Ubiquitous Computing, Springer Boston
    • L. Bussard and W. Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In Security and Privacy in the Age of Ubiquitous Computing, volume 181 of IFIP Advances in Information and Communication Technology, pages 223-238. Springer Boston, 2005.
    • (2005) IFIP Advances in Information and Communication Technology , vol.181 , pp. 223-238
    • Bussard, L.1    Bagga, W.2
  • 10
    • 80054817974 scopus 로고    scopus 로고
    • A formal approach to distance-bounding RFID protocols
    • Information Security Conference (ISC) 2011, To appear
    • U. Duerholz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance-bounding RFID protocols. In Information Security Conference (ISC) 2011, LNCS, 2011. To appear.
    • (2011) LNCS
    • Duerholz, U.1    Fischlin, M.2    Kasper, M.3    Onete, C.4
  • 13
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • Proc. 5th International Workshop on Security Protocols, Springer
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In Proc. 5th International Workshop on Security Protocols, volume 1361 of LNCS, pages 91-104. Springer, 1997.
    • (1997) LNCS , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 14
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID distance bounding protocol
    • Information Security and Cryptology ICISC 2008, Springer
    • C. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID distance bounding protocol. In Information Security and Cryptology ICISC 2008, volume 5461 of Lecture Notes in Computer Science, pages 98-115. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5461 , pp. 98-115
    • Kim, C.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 18
    • 84882715141 scopus 로고    scopus 로고
    • Distance bounding protocols: Authentication logic analysis and collusion attacks
    • Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer US
    • C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, pages 279-298. Springer US, 2007.
    • (2007) Advances in Information Security , vol.30 , pp. 279-298
    • Meadows, C.1    Poovendran, R.2    Pavlovic, D.3    Chang, L.4    Syverson, P.5
  • 19
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • November
    • J. Munilla and A. Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 8:1227-1232, November 2008.
    • (2008) Wirel. Commun. Mob. Comput. , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 22
    • 80053005536 scopus 로고    scopus 로고
    • Investigation of signal and message manipulations on the wireless channel
    • ESORICS 2011 - 16th European Symposium on Research in Computer Security. Proceedings, Springer
    • C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun. Investigation of signal and message manipulations on the wireless channel. In ESORICS 2011 - 16th European Symposium on Research in Computer Security. Proceedings, volume 6879 of LNCS, pages 40-59. Springer, 2011.
    • (2011) LNCS , vol.6879 , pp. 40-59
    • Pöpper, C.1    Tippenhauer, N.O.2    Danev, B.3    Čapkun, S.4
  • 25
    • 85175133310 scopus 로고    scopus 로고
    • Automatic analysis of distance bounding protocols
    • Foundations of Computer Security. Affiliated to
    • B. B. S. Malladi and K. Kothapalli. Automatic analysis of distance bounding protocols. In Foundations of Computer Security. Affiliated to LICS09, August 2009. Informal proceedings.
    • LICS09, August 2009. Informal Proceedings
    • Malladi, B.B.S.1    Kothapalli, K.2
  • 30
    • 34247391971 scopus 로고    scopus 로고
    • Integrity regions: Authentication through presence in wireless networks
    • ACM
    • S. Čapkun and M. Čagalj. Integrity regions: authentication through presence in wireless networks. In ACM workshop on Wireless security, pages 1-10. ACM, 2006.
    • (2006) ACM Workshop on Wireless Security , pp. 1-10
    • Čapkun, S.1    Čagalj, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.