Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jin Seok KIM, Kookrae CHO, Dae Hyun YUM, Sung Je HONG, Pil Joong LEE, "Lightweight Distance Bounding Protocol against Relay Attacks" in IEICE TRANSACTIONS on Information,
vol. E95-D, no. 4, pp. 1155-1158, April 2012, doi: 10.1587/transinf.E95.D.1155.
Abstract: Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.
URL: https://globals.ieice.org/en_transactions/information/10.1587/transinf.E95.D.1155/_p
Copy
@ARTICLE{e95-d_4_1155,
author={Jin Seok KIM, Kookrae CHO, Dae Hyun YUM, Sung Je HONG, Pil Joong LEE, },
journal={IEICE TRANSACTIONS on Information},
title={Lightweight Distance Bounding Protocol against Relay Attacks},
year={2012},
volume={E95-D},
number={4},
pages={1155-1158},
abstract={Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.},
keywords={},
doi={10.1587/transinf.E95.D.1155},
ISSN={1745-1361},
month={April},}
Copy
TY - JOUR
TI - Lightweight Distance Bounding Protocol against Relay Attacks
T2 - IEICE TRANSACTIONS on Information
SP - 1155
EP - 1158
AU - Jin Seok KIM
AU - Kookrae CHO
AU - Dae Hyun YUM
AU - Sung Je HONG
AU - Pil Joong LEE
PY - 2012
DO - 10.1587/transinf.E95.D.1155
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E95-D
IS - 4
JA - IEICE TRANSACTIONS on Information
Y1 - April 2012
AB - Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.
ER -