2015
DOI: 10.1016/j.ijcip.2015.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…To the best of our knowledge, this is the first attempt which provides an extensive overview of the attacks and their prevention techniques for ZICDA access control systems. However, some efforts have been made to describe the problem and its possible solutions within one specific protocol such as distance bounding protocols for distance based attacks [19], or within a particular communication technology like RFID [21]. But, these state-of-the-art survey articles does not sufficiently cover the details of all the ongoing attacks and their proposed solutions on proximity-based systems.…”
Section: A Motivation and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…To the best of our knowledge, this is the first attempt which provides an extensive overview of the attacks and their prevention techniques for ZICDA access control systems. However, some efforts have been made to describe the problem and its possible solutions within one specific protocol such as distance bounding protocols for distance based attacks [19], or within a particular communication technology like RFID [21]. But, these state-of-the-art survey articles does not sufficiently cover the details of all the ongoing attacks and their proposed solutions on proximity-based systems.…”
Section: A Motivation and Contributionsmentioning
confidence: 99%
“…One way to detect proximity is through received signal strength, but an adversary can easily manipulate signal strength through active relays. Authors in [21] provide study depicting that different types of proximity-based access control systems are susceptible to MIM attacks. Mainly, the relay attacks are successful in ten car models from eight different vendors [8].…”
Section: A Overview Of Zicda Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The invader listens to the verification of another chip and forwards the same communication to the reader acting like the genuine chip, and they can alter the communication to paralyze the message route which results in denial-of-service. To prevent the attack, there is need for forceful joint authentication composed with a complex computation process, because the attacks are hard to defend even with encryption [12]. A server need not to convey any parameter(s) in a controllable form.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%