Publications-Periodical Articles

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 On Addressing RFID/NFC-based Relay Attacks: An Overview
作者 杜雨儒
Tu, Tony Yu-Ju
Piramuthu, Selwyn
貢獻者 資管系
關鍵詞 RFID ; Relay attack ; Cryptography ; Ambient conditions
日期 2020-02
上傳時間 26-May-2020 15:10:52 (UTC+8)
摘要 Relay attacks generally occur between two entities that communicate with each other through wireless means. When a relay attack between a honest prover and a honest verifier occurs, an adversary tricks the prover and verifier into believing that they are indeed communicating with each other. Such attacks are rather difficult to identify and prevent since a passive adversary does not modify any of the communicated messages between prover and verifier. RFID/NFC-based applications are particularly vulnerable to such attacks. We provide an overview of RFID-based relay attacks and evaluate various streams of research that have attempted to address these attacks. Specifically, we consider distance-bounding techniques and the use of artificial or natural ambient conditions, with specific emphasis on the latter.
關聯 Decision Support Systems, pp.113194
資料類型 article
DOI https://doi.org/10.1016/j.dss.2019.113194
dc.contributor 資管系-
dc.creator (作者) 杜雨儒-
dc.creator (作者) Tu, Tony Yu-Ju-
dc.creator (作者) Piramuthu, Selwyn-
dc.date (日期) 2020-02-
dc.date.accessioned 26-May-2020 15:10:52 (UTC+8)-
dc.date.available 26-May-2020 15:10:52 (UTC+8)-
dc.date.issued (上傳時間) 26-May-2020 15:10:52 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/129965-
dc.description.abstract (摘要) Relay attacks generally occur between two entities that communicate with each other through wireless means. When a relay attack between a honest prover and a honest verifier occurs, an adversary tricks the prover and verifier into believing that they are indeed communicating with each other. Such attacks are rather difficult to identify and prevent since a passive adversary does not modify any of the communicated messages between prover and verifier. RFID/NFC-based applications are particularly vulnerable to such attacks. We provide an overview of RFID-based relay attacks and evaluate various streams of research that have attempted to address these attacks. Specifically, we consider distance-bounding techniques and the use of artificial or natural ambient conditions, with specific emphasis on the latter.-
dc.format.extent 785660 bytes-
dc.format.mimetype application/pdf-
dc.relation (關聯) Decision Support Systems, pp.113194-
dc.subject (關鍵詞) RFID ; Relay attack ; Cryptography ; Ambient conditions-
dc.title (題名) On Addressing RFID/NFC-based Relay Attacks: An Overview-
dc.type (資料類型) article-
dc.identifier.doi (DOI) 10.1016/j.dss.2019.113194-
dc.doi.uri (DOI) https://doi.org/10.1016/j.dss.2019.113194-