Relay attacks concerns in wireless ad hoc, sensors, and RFID networks

The recent advancements in embedded and wireless systems have led to a new class of pervasive technologies, such as Radio Frequency Identification RFID Networks, Ad-Hoc Networks, and Wireless Sensor Networks WSNs. These networks have presented promising solutions for a wide range of technological applications. However, privacy and security concerns in these systems have remained a matter of great concern. The privacy and security concerns in these networks become more serious when the networks are integrated. In this paper, simulation of relay attacks is presented on the commonly used ISO/IEC 14443 standard. A mobile phone and an RFID tag emulator have been used. The emulator and the phone are set to share RFID communication through a Bluetooth channel. The results of the relay attacks are then presented. Finally, the paper suggests possible solutions that can be implemented to protect against the attacks. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Juan Manuel González Nieto,et al.  Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.

[2]  Rongxing Lu,et al.  Vehicular Ad Hoc Network Security and Privacy , 2015 .

[3]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[4]  Steven J. Murdoch,et al.  Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.

[5]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[6]  Marta Z. Kwiatkowska,et al.  Stochastic Model Checking , 2007, SFM.

[7]  Jorge Munilla,et al.  Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels , 2008 .

[8]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[9]  Smail Tedjini,et al.  On the weakness of contactless systems under relay attacks , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[10]  Ian F. Akyildiz,et al.  Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .

[11]  Xiaodong Lin,et al.  Vehicular Ad Hoc Network Security and Privacy: Lin/Vehicular , 2015 .

[12]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .

[13]  Michael Hutter,et al.  Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks , 2011, 2011 IEEE International Conference on RFID-Technologies and Applications.