Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols.
Azadeh Imani RadMahdi R. AlaghebandSaeed Banaeian FarPublished in: J. Inf. Secur. Appl. (2018)
Keyphrases
- security protocols
- terrorist attacks
- cryptographic protocols
- identity theft
- rfid tags
- rfid systems
- upper bound
- low cost
- countermeasures
- money laundering
- terrorist groups
- distance measure
- fraud detection
- social network analysis
- distance function
- anomaly detection
- security threats
- anti collision
- security flaws
- rfid technology
- security mechanisms
- mutual authentication
- watermarking scheme
- terrorist activities
- privacy preserving
- data collection
- data mining techniques