Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
 
conference paper

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks

Bay, Asli  
•
Boureanu, Ioana Cristina  
•
Mitrokotsa, Aikaterini  
Show more
Kutyłowski, M.
•
Yung, M.
2012
Information Security and Cryptology. Inscrypt 2012
88th China International Conference on Information Security and Cryptology (Inscrypt 2012)

The communication between an honest prover and an honest verifier can be intercepted by a malicious man-in-the-middle (MiM), without the legitimate interlocutors noticing the intrusion. The attacker can simply relay messages from one party to another, eventually impersonating the prover to the verifier and possibly gaining the privileges of the former. This sort of simple relay attacks are prevalent in wireless communications (e.g., RFID-based protocols) and can affect several infrastructures from contactless payments to remote car-locking systems and access-control verification in high-security areas. As the RFID/NFC technology prevails, a practical and increasingly popular countermeasure to these attacks is given by distance-bounding protocols. Yet, the security of these protocols is still not mature. Importantly, the implications of the return channel (i.e., knowing whether the protocol finished successfully or not) in the security of some distance-bounding protocols have not been fully assessed. In this paper, we demonstrate this by a series of theoretical and practical attacks.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-642-38519-3_23
Author(s)
Bay, Asli  
Boureanu, Ioana Cristina  
Mitrokotsa, Aikaterini  
Spulber, Iosif-Daniel  
Vaudenay, Serge  
Editors
Kutyłowski, M.
•
Yung, M.
Date Issued

2012

Publisher

Springer

Publisher place

Heidelberg

Published in
Information Security and Cryptology. Inscrypt 2012
Series title/Series vol.

Lecture Notes in Computer Science; 7763

Start page

371

End page

391

Subjects

RFIDs

•

Man-in-the-middle (MiM)

•

Bussard-Bagga protocol

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
88th China International Conference on Information Security and Cryptology (Inscrypt 2012)

Beijing, China

November 28 - December 1, 2012

Available on Infoscience
October 26, 2012
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/86311
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés