Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://ruomo.lib.uom.gr/handle/7000/107
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorAlexiou, Nikolaos-
dc.contributor.authorBasagiannis, Stylianos-
dc.contributor.authorPetridou, Sophia-
dc.date.accessioned2019-10-25T12:20:18Z-
dc.date.available2019-10-25T12:20:18Z-
dc.date.issued2016-07-
dc.identifier10.1016/j.cose.2016.03.002en_US
dc.identifier.issn01674048en_US
dc.identifier.urihttps://doi.org/10.1016/j.cose.2016.03.002en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/107-
dc.description.abstractNear field communication (NFC) is a short-range wireless communication technology envisioned to support a large gamut of smart-device applications, such as payment and ticketing. Although two NFC devices need to be in close proximity to communicate (up to 10 cm), adversaries can use a fast and transparent communication channel to relay data and, thus, force an NFC link between two distant victims. Since relay attacks can bypass the NFC requirement for short-range communication cheaply and easily, it is important to evaluate the security of NFC applications. In this work, we present a general framework that exploits formal analysis and especially model checking as a means of verifying the resiliency of NFC protocol against relay attacks. Toward this goal, we built a continuous-time Markov chain (CTMC) model using the PRISM model checker. Firstly, we took into account NFC protocol parameters and, then, we enhanced our model with networking parameters, which include both mobile environment and security-aware characteristics. Combining NFC specifications with an adversary's characteristics, we produced the relay attack model, which is used for extracting our security analysis results. Through these results, we can explain how a relay attack could be prevented and discuss potential countermeasures.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.sourceComputers & Securityen_US
dc.subjectFRASCATI::Engineering and technologyen_US
dc.subject.otherNear field communicationen_US
dc.subject.otherSecurity analysisen_US
dc.titleFormal security analysis of near field communication using model checkingen_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.volume60en_US
local.identifier.firstpage1en_US
local.identifier.lastpage14en_US
Εμφανίζεται στις Συλλογές: Τμήμα Εφαρμοσμένης Πληροφορικής

Αρχεία σε αυτό το Τεκμήριο:
Αρχείο Περιγραφή ΜέγεθοςΜορφότυπος 
SPetridou_COSE2016.pdfCOSE Journal768,05 kBAdobe PDFThumbnail
Προβολή/Ανοιγμα


Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.