TY - GEN
T1 - Relay-proof channels using UWB lasers
AU - Christianson, B.
AU - Shafarenko, Alex
AU - Stajano, Frank
AU - Wong, Ford-Long
PY - 2014
Y1 - 2014
N2 - Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented?
AB - Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented?
U2 - 10.1007/978-3-662-45921-8_8
DO - 10.1007/978-3-662-45921-8_8
M3 - Conference contribution
AN - SCOPUS:84915795103
SN - 9783662459201
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 45
EP - 46
BT - Security Protocols XVIII
PB - Springer Nature Link
T2 - 18th International Workshop Security Protocols
Y2 - 24 March 2010 through 26 March 2010
ER -