All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices.
Abolfazl FalahatiHoda JannatiPublished in: Electron. Commer. Res. (2015)
Keyphrases
- low cost
- authentication protocol
- rfid tags
- embedded systems
- key exchange protocol
- mobile devices
- denial of service attacks
- lightweight
- money laundering
- upper bound
- scanning devices
- fraud detection
- real time
- distance measure
- data mining techniques
- attack scenarios
- terrorist activities
- residual energy
- security protocols
- network analysis
- cryptographic protocols
- dos attacks
- social network analysis
- privacy protection
- countermeasures
- smart card