Cited 5 time in webofscience Cited 5 time in scopus

Lightweight Distance Bounding Protocol against Relay Attacks

Title
Lightweight Distance Bounding Protocol against Relay Attacks
Authors
Kim, JS[Kim, Jin Seok]Cho, K[Cho, Kookrae]Yum, DH[Yum, Dae Hyun]Hong, SJ[Hong, Sung Je]Lee, PJ[Lee, Pil Joong]
DGIST Authors
Cho, K[Cho, Kookrae]
Issue Date
2012-04
Citation
IEICE Transactions on Information and Systems, E95D(4), 1155-1158
Type
Article
Article Type
Article
Keywords
AuthenticationAuthentication ProtocolsComputer CrimeCrimeCryptographic TechniquesDistance BoundingDistance Hounding ProtocolFalse Acceptance RateGraphic TechniquesIdentity VerificationMafia Fraud AttackRelay AttackSecurity
ISSN
0916-8532
Abstract
Traditional authentication protocols are based on crypto graphic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the dis tance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. Copyright © 2012 The Institute of Electronics, Information and Communication Engineers.
URI
http://hdl.handle.net/20.500.11750/3373
DOI
10.1587/transinf.E95.D.1155
Publisher
institute of Electronics, Information and Communication Engineers
Related Researcher
Files:
There are no files associated with this item.
Collection:
Companion Diagnostics and Medical Technology Research Group1. Journal Articles


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE