Publication | Closed Access
RFIDs and secret handshakes
96
Citations
15
References
2008
Year
Unknown Venue
Contactless CardsEngineeringInformation SecurityWearable TechnologyCommunicationRadio Frequency IdentificationHardware SecurityWireless SecuritySecure CommunicationInternet Of ThingsAuthentication ProtocolLightweight Authentication MechanismIdentity-based SecurityMobile ComputingComputer ScienceRfid TagData SecurityCryptographySecret HandshakesRfid Tags
We tackle the problem of defending against ghost-and-leech (a.k.a. proxying, relay, or man-in-the-middle) attacks against RFID tags and other contactless cards. The approach we take -- which we dub secret handshakes -- is to incorporate gesture recognition techniques directly on the RFID tags or contactless cards. These cards will only engage in wireless communications when they internally detect these secret handshakes. We demonstrate the effectiveness of this approach by implementing our secret handshake recognition system on a passive WISP RFID tag with a built-in accelerometer. Our secret handshakes approach is backward compatible with existing deployments of RFID tag and contactless card readers.
| Year | Citations | |
|---|---|---|
2006 | 1.9K | |
2017 | 1.2K | |
2003 | 811 | |
2008 | 725 | |
2004 | 686 | |
2008 | 598 | |
2006 | 485 | |
2006 | 294 | |
2005 | 270 | |
2007 | 227 |
Page 1
Page 1