• Corpus ID: 21359353

Control Policy-Issues Credentials ( Tokens ) TU Client

@inproceedings{Dmitrienko2017ControlPC,
  title={Control Policy-Issues Credentials ( Tokens ) TU Client},
  author={A. Dmitrienko},
  year={2017}
}
In this paper, we present a new access control system for free-floating car sharing, which achieves a number of appealing features not available in the state-of-the-art solutions. First of all, it does not require online connection for cars, and, therefore, allows car sharing providers to expand their services to areas without reliable network coverage (e.g., with blind spots). Second, the solution is compatible to RFID cards – the most commonly deployed authentication tokens in car sharing… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 36 REFERENCES
Secure Physical Access with NFC-enabled Smartphones
This paper presents a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server, but rather use the connectivity of the
Proximity Verification for Contactless Access Control and Authentication Systems
TLDR
This work proposes a novel distance bounding system specifically designed for short-range contactless access control and authentication applications that combines frequency modulated continuous wave (FMCW) and backscatter communication and shows that it offers strong security guarantees.
SmartTokens: Delegable Access Control with NFC-Enabled Smartphones
TLDR
This work presents the design and implementation of a generic access control system for NFC-enabled smartphones based on a multi-level security architecture for smartphones, and provides a formal security analysis of the protocols and evaluates the performance of the solution.
An Application Security Framework for Near Field Communication
TLDR
The NFC security framework minimizes the need to intrusively authenticate the user for every NFC transaction thus maintaining the simplicity of using NFC while enhancing its security.
Gone in 360 Seconds: Hijacking with Hitag2
TLDR
Several weaknesses in the design of the cipher are revealed and three practical attacks that recover the secret key using only wireless communication are presented, which allow an adversary to bypass the cryptographic authentication, leaving only the mechanical key as safeguard.
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
TLDR
Two efficient and inexpensive attack realizations are built that allow the attacker to enter and start a car by relaying messages between the car and the smart key, completely independent of the modulation, protocol, or presence of strong authentication and encryption.
Practical attacks on proximity identification systems
  • G. Hancke
  • Computer Science
    2006 IEEE Symposium on Security and Privacy (S&P'06)
  • 2006
TLDR
Focusing mainly on the RF communication interface, the results and implementation of eavesdropping, unauthorized scanning and relay attacks against 'proximity' (ISO 14443 A) type RFID tokens are discussed.
ID-Based Secure Distance Bounding and Localization
TLDR
Verifiable Multilateration -- a secure localization scheme that enables the computation of a correct device location in the presence of an adversary is implemented, which is the first implementation of an RF ToA secure localization system.
A Practical Attack on KeeLoq
TLDR
It is concluded that the practical key recovery attack against KeeLoq can be used to subvert the security of real systems and reveal the master secret used in an entire class of devices from attacking a single device.
Market-Driven Code Provisioning to Mobile Secure Hardware
TLDR
Today, most smartphones feature different kinds of secure hardware, such as processor-based security extensions and dedicated secure co-processors, which are almost never utilized by commercial third party apps, although their usage would drastically improve security of security critical apps.
...
1
2
3
4
...