Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many acc...
Abstract. Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat agains...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
Abstract. From contactless payments to remote car unlocking, many applications are vulnerable to rel...
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many acc...
Abstract. Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat agains...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks...
Abstract. From contactless payments to remote car unlocking, many applications are vulnerable to rel...
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...