Cited 5 time in
Cited 5 time in
Lightweight Distance Bounding Protocol against Relay Attacks
- Lightweight Distance Bounding Protocol against Relay Attacks
- Kim, JS[Kim, Jin Seok]; Cho, K[Cho, Kookrae]; Yum, DH[Yum, Dae Hyun]; Hong, SJ[Hong, Sung Je]; Lee, PJ[Lee, Pil Joong]
- DGIST Authors
- Cho, K[Cho, Kookrae]
- Issue Date
- IEICE Transactions on Information and Systems, E95D(4), 1155-1158
- Article Type
- Authentication; Authentication Protocols; Computer Crime; Crime; Cryptographic Techniques; Distance Bounding; Distance Hounding Protocol; False Acceptance Rate; Graphic Techniques; Identity Verification; Mafia Fraud Attack; Relay Attack; Security
- Traditional authentication protocols are based on crypto graphic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the dis tance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. Copyright © 2012 The Institute of Electronics, Information and Communication Engineers.
- institute of Electronics, Information and Communication Engineers
- Related Researcher
There are no files associated with this item.
- Companion Diagnostics and Medical Technology Research Group1. Journal Articles
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.