메뉴 건너뛰기




Volumn , Issue , 2015, Pages 1318-1323

Implementation of an RFID relay attack countermeasure

Author keywords

Distance bounding; Relay attacks; RFID; Security

Indexed keywords

IDENTIFICATION (CONTROL SYSTEMS); MOBILE COMPUTING; MOBILE PHONES; SMART CARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84949483379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2015.7289273     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 84949498364 scopus 로고    scopus 로고
    • EPC global
    • EPC global, link: http://www.gs1. org/epcglobal
  • 2
    • 84949502237 scopus 로고    scopus 로고
    • http://rfid. net/basics/186-iso-rfid-standards-a-complete-list
  • 3
    • 33847269759 scopus 로고    scopus 로고
    • Picking virtual pockets using relay attacks on contactless smartcard systems
    • Athens, Greece, 5-9 September
    • Ziv Kfir and Avishai Wool. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. n SecureComm 2005, Athens, Greece, 5-9 September., pages 47-58
    • N SecureComm 2005 , pp. 47-58
    • Kfir, Z.1    Wool, A.2
  • 4
    • 33751067978 scopus 로고    scopus 로고
    • Practical attacks on proximity identification systems
    • Berkeley/Oakland, California, USA, 21-24 May
    • Gerhard P. Hancke. Practical Attacks on Proximity Identification Systems. In IEEE Security and Privacy-S&P 2006, Berkeley/Oakland, California, USA, 21-24 May, pages 328-333
    • (2006) IEEE Security and Privacy-S&P , pp. 328-333
    • Gerhard, P.1    Hancke2
  • 5
    • 82155192527 scopus 로고    scopus 로고
    • Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks
    • Barcelona, Spain, September 15-16
    • Wolfgang Issovits and Michael Hutter. Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks. In RFID-TA 2011, Barcelona, Spain, September 15-16., pages 335-342
    • (2011) RFID-TA , pp. 335-342
    • Issovits, W.1    Hutter, M.2
  • 6
    • 81455132091 scopus 로고    scopus 로고
    • On the weakness of contactless systems under relay attacks
    • Pierre-Henri Thevenon, Olivier Savry, and Smail Tedjini. On the weakness of contactless systems under relay attacks. In SoftCOM 2011, pages 1-5
    • (2011) SoftCOM , pp. 1-5
    • Thevenon, P.1    Savry, O.2    Tedjini, S.3
  • 7
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • Athens, Greece, 5-9 September.
    • Gerhard Hancke and Markus Kuhn. An RFID Distance Bounding Protocol. In SecureComm 2005, Athens, Greece, 5-9 September., pages 67-73.
    • (2005) SecureComm , pp. 67-73
    • Hancke, G.1    Kuhn, M.2
  • 8
    • 38149113034 scopus 로고    scopus 로고
    • Distance bounding protocols with void-challengesnfor RFID
    • Graz, Austria, July 12-14
    • Jorge Munilla, Andres Ortiz, and Alberto Peinado. Distance Bounding Protocols with void-challengesnfor RFID. In RFIDSec 2006, Graz, Austria, July 12-14
    • (2006) RFIDSec
    • Munilla, J.1    Ortiz, A.2    Peinado, A.3
  • 9
    • 34748825630 scopus 로고    scopus 로고
    • Detecting relay attacks with timing based protocols
    • Singapore, March 20-22
    • Jason Reid, Juan Gonzalez Neito, Tee Tang, and Bouchra Senadji. Detecting Relay Attacks with Timing Based Protocols. ASIACCS, Singapore, March 20-22, 2007
    • (2007) ASIACCS
    • Reid, J.1    Gonzalez Neito, J.2    Tang, T.3    Senadji, B.4
  • 10
    • 0004239952 scopus 로고    scopus 로고
    • Carl Hanser Verlag, 2nd edition, April
    • Klaus Finkenzeller. RFID-Handbook. Carl Hanser Verlag, 2nd edition, April 2003. ISBN 0-470-84402-7
    • (2003) RFID-Handbook
    • Finkenzeller, K.1
  • 13
    • 84949526458 scopus 로고    scopus 로고
    • www.iso. org/iso/home/store/catalogue-ics/catalogue-detail-ics. htm?csnumber=43458
  • 14
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • Boston, MA), USENIX Association
    • Saar Drimer and Steven J. Murdoch, Keep your enemies close: distance bounding against smartcard relay attacks, Proceedings of 16th USENIX Security Symposium (Boston, MA), USENIX Association, 2007, pp. 1-16
    • (2007) Proceedings of 16th USENIX Security Symposium , pp. 1-16
    • Drimer, S.1    Murdoch, S.J.2
  • 15
    • 33751067978 scopus 로고    scopus 로고
    • Practical attacks on proximity identification systems (short paper)
    • Oakland, CA), IEEE Computer Society
    • Gerhard P. Hancke, Practical attacks on proximity identification systems (short paper), SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (Oakland, CA), IEEE Computer Society, 2006, pp. 328-333
    • (2006) SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy , pp. 328-333
    • Gerhard, P.1    Hancke2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.