In relay attacks, a connection is created between a legitimate reader and a victim’s legitimate tag. In order to
counter relay attacks, cryptographic techniques have been developed, such as distance bounding, pairings and
threshold cryptography. These techniques have been integrated into a novel approach, called threshold-based
distance bounding protocol [36], which distributes a user’s private key among various personal devices to
improve security and reliability. For the future, it is reported [36] that “research is needed to develop a practical,
low-cost, dedicated broadcast channel, accessible to all devices”.
In relay attacks, a connection is created between a legitimate reader and a victim’s legitimate tag. In order to
counter relay attacks, cryptographic techniques have been developed, such as distance bounding, pairings and
threshold cryptography. These techniques have been integrated into a novel approach, called threshold-based
distance bounding protocol [36], which distributes a user’s private key among various personal devices to
improve security and reliability. For the future, it is reported [36] that “research is needed to develop a practical,
low-cost, dedicated broadcast channel, accessible to all devices”.
การแปล กรุณารอสักครู่..