publication . Preprint . 2016

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

Gurulian, Iakovos; Shepherd, Carlton; Markantonakis, Konstantinos; Akram, Raja Naeem; Mayes, Keith;
Open Access English
  • Published: 02 May 2016
Abstract
Comment: 20 pages, 7 figures, 5 tables, Analysis of 7 Ambient Sensors
Subjects
ACM Computing Classification System: ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS
free text keywords: Computer Science - Cryptography and Security
Download from
33 references, page 1 of 3

1. Android API Reference Documentation: Host-based Card Emulation. http://developer. android.com/guide/topics/sensors/sensors_overview.html. [accessed 27-April-2016].

2. Android API Reference Documentation: Sensors Overview. http://developer.android. com/guide/topics/sensors/sensors_overview.html. [accessed 27-April-2016].

3. Anonymous.

4. A Cashless Future on the Horizon. White paper, VeriFone, 2010.

5. The Future of Ticketing: Paying for Public Transport Journeys Using Visa Cards in the 21st Century. Whitepaper, VISA, January 2013.

6. How to Optimize the Consumer Contactless Experience? The Perfect Tap, 2014.

7. MasterCard Contactless Performance Requirement. Online, MasterCard, March 2014.

8. Contactless Mobile Payments ( nally) Gain Momentum. Online report, Deloitte, 2015.

9. Transactions Acceptance Device Guide (TADG). Speci cation Version 3.0, VISA, May 2015.

10. UK Cards Payments 2015. Online report, The UK Cards Association, 2015.

11. EMV Contactless Speci cations for Payment Systems: Book D - EMV Contactless Communication Protocol Speci cation. Speci cation Version 2.6, EMVCo, LLC, March 2016.

12. Boureanu, I., Mitrokotsa, A., and Vaudenay, S. Towards Secure Distance Bounding. In Fast Software Encryption (2014), Springer, pp. 55{67.

13. Coskun, V., Ozdenizci, B., and Ok, K. A Survey on Near Field Communication (NFC) Technology. Wireless Personal Communications 71, 3 (2013), 2259{2294.

14. Cremers, C., Rasmussen, K., Schmidt, B., and Capkun, S. Distance Hijacking Attacks on Distance Bounding Protocols. In Security and Privacy (SP), 2012 IEEE Symposium on (May 2012), pp. 113{127.

15. Drimer, S., and Murdoch, S. J. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. In USENIX Security (2007), N. Provos, Ed., USENIX Association.

33 references, page 1 of 3
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue