Munilla et al., 2008 - Google Patents
Security analysis of Tu and Piramuthu's protocolMunilla et al., 2008
- Document ID
- 13730377963634851907
- Author
- Munilla J
- Peinado A
- Publication year
- Publication venue
- 2008 New Technologies, Mobility and Security
External Links
Snippet
RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be …
- 238000004458 analytical method 0 title description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Munilla et al. | Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels | |
Kim et al. | RFID distance bounding protocol with mixed challenges to prevent relay attacks | |
Avoine et al. | Security of distance-bounding: A survey | |
Reid et al. | Detecting relay attacks with timing-based protocols | |
Avoine et al. | A framework for analyzing RFID distance bounding protocols | |
Kim et al. | The swiss-knife RFID distance bounding protocol | |
Avoine et al. | An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement | |
US8698605B2 (en) | Determining the validity of a connection between a reader and a transponder | |
US10044512B2 (en) | Decoupling of measuring the response time of a transponder and its authentication | |
Kardaş et al. | A novel RFID distance bounding protocol based on physically unclonable functions | |
Kim et al. | RFID distance bounding protocols with mixed challenges | |
Hancke | Distance-bounding for RFID: Effectiveness of ‘terrorist fraud’in the presence of bit errors | |
Mitrokotsa et al. | Mafia fraud attack against the rč distance-bounding protocol | |
US8812840B2 (en) | Method for fast pre-authentication by distance recognition | |
Tewari et al. | A robust anonymity preserving authentication protocol for IoT devices | |
Yang et al. | An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy | |
Avoine et al. | RFID distance bounding multistate enhancement | |
Abidin et al. | Secure, accurate, and practical narrow-band ranging system | |
Munilla et al. | Enhanced low‐cost RFID protocol to detect relay attacks | |
Munilla et al. | Security analysis of Tu and Piramuthu's protocol | |
Tu et al. | Lightweight non-distance-bounding means to address RFID relay attacks | |
Özhan Gürel et al. | Non-uniform stepping approach to RFID distance bounding problem | |
Dimitrakakis et al. | Distance-bounding protocols: Are you close enough? | |
Paschou et al. | Physical layer protection against relay/replay attacks for short-range systems | |
Munilla et al. | Attacks on a distance bounding protocol |