University of Hertfordshire

By the same authors

Relay-proof channels using UWB lasers

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Documents

View graph of relations
Original languageEnglish
Title of host publicationSecurity Protocols XVIII
PublisherSpringer-Verlag, (Berlin-Heidelberg)
Pages45-46
Number of pages2
ISBN (Print)9783662459201
DOIs
Publication statusPublished - 2014
Event18th International Workshop Security Protocols - Cambridge, United Kingdom
Duration: 24 Mar 201026 Mar 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7061
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Workshop Security Protocols
CountryUnited Kingdom
CityCambridge
Period24/03/1026/03/10

Abstract

Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented?

ID: 8047665