2015
DOI: 10.1007/978-3-662-47854-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Relay Cost Bounding for Contactless EMV Payments

Abstract: Abstract. This paper looks at relay attacks against contactless payment cards, which could be used to wirelessly pickpocket money from victims. We discuss the two leading contactless EMV payment protocols (Visa's payWave and MasterCard's PayPass). Stopping a relay attack against cards using these protocols is hard: either the overhead of the communication is low compared to the (cryptographic) computation by the card or the messages can be cached before they are requested by the terminal. We propose a solution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 32 publications
(43 citation statements)
references
References 13 publications
1
35
0
Order By: Relevance
“…This section will illustrate how Visa's contactless protocol works. The protocol is as shown below [1].…”
Section: Published Researchmentioning
confidence: 99%
“…This section will illustrate how Visa's contactless protocol works. The protocol is as shown below [1].…”
Section: Published Researchmentioning
confidence: 99%
“…Timed conditionals can be used to specify the duration of operations, such as checking whether some message is of a given form. In practice, the duration of these operations can be measured empirically to obtain a finer analysis of the protocol [6].…”
Section: Time Expressionsmentioning
confidence: 99%
“…The number of states traversed is quite small for finding these. The distance bounding protocol scheme is used by many other protocols, such as the protocol described in [21] (NSL + Distance Bounding) and the lack of its use leads to an attack on the Paywave protocol [6]. We implemented these to check how our tool scales to larger protocols.…”
Section: Prototype Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…If the RTT is within a given bound, then there is a low likelihood that a relay attack occurred. As such, the contactless version of the EMV protocol has recently been enhanced with such a relay-counteraction mechanism [5] (see Figure 2), in the style of a previously proposed DB protocol [4].…”
Section: Introductionmentioning
confidence: 99%