首页> 外文会议>2011 IEEE International Conference on RFID-Technologies and Applications >Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks
【24h】

Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks

机译:ISO / IEC 14443协议有关中继攻击的弱点

获取原文

摘要

RFID and NFC are widely spread contactless communication systems and are commonly used in security-critical applications such as payment and keyless-entry systems. Relay attacks pose a serious threat in this context that are not addressed by most of the RFID applications in use today. The attacks circumvent application-layer security and they cannot be prevented by the usual cryptographic primitives. In this paper, we will present a practical implementation of a relay attack based on systems using the widely used ISO/IEC 14443 standard. We use an off-the-shelf mobile phone and a self-developed RFID-tag emulator that can forward RFID communication over a Bluetooth channel. We will show that the attack succeeded and discuss various methods how to exploit certain mechanisms of the ISO protocol to increase the chance for a successful attack. We will also give recommendations to protect against relay attacks in practice while still complying to the ISO standard which is not considered by most of the proposed countermeasures given in literature.
机译:RFID和NFC是广泛传播的非接触式通信系统,通常用于对安全要求严格的应用中,例如支付和无钥匙进入系统。在这种情况下,中继攻击构成了严重的威胁,当前使用的大多数RFID应用程序都无法解决中继攻击。攻击规避了应用程序层的安全性,并且通常的加密原语无法阻止这些攻击。在本文中,我们将介绍基于使用广泛使用的ISO / IEC 14443标准的系统的中继攻击的实际实现。我们使用现成的手机和自行开发的RFID标签仿真器,该仿真器可以通过蓝牙通道转发RFID通信。我们将证明攻击成功,并讨论了各种方法如何利用ISO协议的某些机制来增加成功攻击的机会。我们还将提出一些建议,以在实践中防止中继攻击,同时仍然符合ISO标准,而文献中给出的大多数拟议对策都未考虑该标准。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号