[go: up one dir, main page]

Munilla et al., 2008 - Google Patents

Security analysis of Tu and Piramuthu's protocol

Munilla et al., 2008

Document ID
13730377963634851907
Author
Munilla J
Peinado A
Publication year
Publication venue
2008 New Technologies, Mobility and Security

External Links

Snippet

RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Munilla et al. Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels
Kim et al. RFID distance bounding protocol with mixed challenges to prevent relay attacks
Avoine et al. Security of distance-bounding: A survey
Reid et al. Detecting relay attacks with timing-based protocols
Avoine et al. A framework for analyzing RFID distance bounding protocols
Kim et al. The swiss-knife RFID distance bounding protocol
Avoine et al. An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
US8698605B2 (en) Determining the validity of a connection between a reader and a transponder
US10044512B2 (en) Decoupling of measuring the response time of a transponder and its authentication
Kardaş et al. A novel RFID distance bounding protocol based on physically unclonable functions
Kim et al. RFID distance bounding protocols with mixed challenges
Hancke Distance-bounding for RFID: Effectiveness of ‘terrorist fraud’in the presence of bit errors
Mitrokotsa et al. Mafia fraud attack against the rč distance-bounding protocol
US8812840B2 (en) Method for fast pre-authentication by distance recognition
Tewari et al. A robust anonymity preserving authentication protocol for IoT devices
Yang et al. An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy
Avoine et al. RFID distance bounding multistate enhancement
Abidin et al. Secure, accurate, and practical narrow-band ranging system
Munilla et al. Enhanced low‐cost RFID protocol to detect relay attacks
Munilla et al. Security analysis of Tu and Piramuthu's protocol
Tu et al. Lightweight non-distance-bounding means to address RFID relay attacks
Özhan Gürel et al. Non-uniform stepping approach to RFID distance bounding problem
Dimitrakakis et al. Distance-bounding protocols: Are you close enough?
Paschou et al. Physical layer protection against relay/replay attacks for short-range systems
Munilla et al. Attacks on a distance bounding protocol