Open Access System for Information Sharing

Login Library

 

Article
Cited 13 time in webofscience Cited 15 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorSangho Lee-
dc.contributor.authorJin Seok Kim-
dc.contributor.authorHong, SJ-
dc.contributor.authorKim, J-
dc.date.accessioned2016-03-31T07:49:24Z-
dc.date.available2016-03-31T07:49:24Z-
dc.date.created2014-03-07-
dc.date.issued2012-09-
dc.identifier.issn1089-7798-
dc.identifier.other2012-OAK-0000031212-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/14050-
dc.description.abstractDistance-bounding protocols enable the establishment of an upper bound on the distance between two communicating parties in such a way that their degree of proximity can be verified. Most of these protocols rely on multi-rounds of single-bit challenge and response. Therefore, in each round, the probability that an adversary will guess the correct response is 1/2. This letter proposes a new method to increase the number of response states of distance-bounding protocols by injecting intentional delays to each round. Our method can reduce the probability of a correct guess from 1/2 to 1/(2k) for each round, where k is the number of different delays, without significant modifications of underlying protocols. Moreover, it can be applied to passive RFID tags, because it requires no special hardware equipment.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherIEEE COMMUNICATIONS SOCIETY-
dc.relation.isPartOfIEEE Communications Letters-
dc.subjectDistance-bounding protocol-
dc.subjectRFID-
dc.subjectmafia fraud attack-
dc.subjectCHALLENGES-
dc.subjectPROTOCOLS-
dc.titleDistance Bounding with Delayed Responses-
dc.typeArticle-
dc.contributor.college컴퓨터공학과-
dc.identifier.doi10.1109/LCOMM.2012.073112.121134-
dc.author.googleLee, S-
dc.author.googleKim, JS-
dc.author.googleHong, SJ-
dc.author.googleKim, J-
dc.relation.volume16-
dc.relation.issue9-
dc.relation.startpage1478-
dc.relation.lastpage1481-
dc.contributor.id10157751-
dc.relation.journalIEEE COMMUNICATIONS LETTERS-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCI-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEEE Communications Letters, v.16, no.9, pp.1478 - 1481-
dc.identifier.wosid000308992000037-
dc.date.tcdate2019-01-01-
dc.citation.endPage1481-
dc.citation.number9-
dc.citation.startPage1478-
dc.citation.titleIEEE Communications Letters-
dc.citation.volume16-
dc.contributor.affiliatedAuthorHong, SJ-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-84866626127-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc7-
dc.description.scptc7*
dc.date.scptcdate2018-05-121*
dc.type.docTypeArticle-
dc.subject.keywordAuthorDistance-bounding protocol-
dc.subject.keywordAuthorRFID-
dc.subject.keywordAuthormafia fraud attack-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

홍성제HONG, SUNG JE
Div of IT Convergence Enginrg
Read more

Views & Downloads

Browse