Relay-proof channels using UWB lasers

B. Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

133 Downloads (Pure)


Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented?
Original languageEnglish
Title of host publicationSecurity Protocols XVIII
PublisherSpringer Nature
Number of pages2
ISBN (Print)9783662459201
Publication statusPublished - 2014
Event18th International Workshop Security Protocols - Cambridge, United Kingdom
Duration: 24 Mar 201026 Mar 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference18th International Workshop Security Protocols
Country/TerritoryUnited Kingdom


Dive into the research topics of 'Relay-proof channels using UWB lasers'. Together they form a unique fingerprint.

Cite this