DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sangho Lee | - |
dc.contributor.author | Jin Seok Kim | - |
dc.contributor.author | Hong, SJ | - |
dc.contributor.author | Kim, J | - |
dc.date.accessioned | 2016-03-31T07:49:24Z | - |
dc.date.available | 2016-03-31T07:49:24Z | - |
dc.date.created | 2014-03-07 | - |
dc.date.issued | 2012-09 | - |
dc.identifier.issn | 1089-7798 | - |
dc.identifier.other | 2012-OAK-0000031212 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/14050 | - |
dc.description.abstract | Distance-bounding protocols enable the establishment of an upper bound on the distance between two communicating parties in such a way that their degree of proximity can be verified. Most of these protocols rely on multi-rounds of single-bit challenge and response. Therefore, in each round, the probability that an adversary will guess the correct response is 1/2. This letter proposes a new method to increase the number of response states of distance-bounding protocols by injecting intentional delays to each round. Our method can reduce the probability of a correct guess from 1/2 to 1/(2k) for each round, where k is the number of different delays, without significant modifications of underlying protocols. Moreover, it can be applied to passive RFID tags, because it requires no special hardware equipment. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | IEEE COMMUNICATIONS SOCIETY | - |
dc.relation.isPartOf | IEEE Communications Letters | - |
dc.subject | Distance-bounding protocol | - |
dc.subject | RFID | - |
dc.subject | mafia fraud attack | - |
dc.subject | CHALLENGES | - |
dc.subject | PROTOCOLS | - |
dc.title | Distance Bounding with Delayed Responses | - |
dc.type | Article | - |
dc.contributor.college | 컴퓨터공학과 | - |
dc.identifier.doi | 10.1109/LCOMM.2012.073112.121134 | - |
dc.author.google | Lee, S | - |
dc.author.google | Kim, JS | - |
dc.author.google | Hong, SJ | - |
dc.author.google | Kim, J | - |
dc.relation.volume | 16 | - |
dc.relation.issue | 9 | - |
dc.relation.startpage | 1478 | - |
dc.relation.lastpage | 1481 | - |
dc.contributor.id | 10157751 | - |
dc.relation.journal | IEEE COMMUNICATIONS LETTERS | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCI | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEEE Communications Letters, v.16, no.9, pp.1478 - 1481 | - |
dc.identifier.wosid | 000308992000037 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 1481 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1478 | - |
dc.citation.title | IEEE Communications Letters | - |
dc.citation.volume | 16 | - |
dc.contributor.affiliatedAuthor | Hong, SJ | - |
dc.contributor.affiliatedAuthor | Kim, J | - |
dc.identifier.scopusid | 2-s2.0-84866626127 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 7 | - |
dc.description.scptc | 7 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Distance-bounding protocol | - |
dc.subject.keywordAuthor | RFID | - |
dc.subject.keywordAuthor | mafia fraud attack | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.