Sciweavers

1342 search results - page 21 / 269
» Attacks are Protocols Too
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol
—We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications...
Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro...
CCS
2005
ACM
14 years 28 days ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
FC
2010
Springer
135views Cryptology» more  FC 2010»
13 years 11 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
RFIDSEC
2010
13 years 5 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...