Artificial Ambient Environments for Proximity Critical Applications
Title | Artificial Ambient Environments for Proximity Critical Applications |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Gurulian, Iakovos, Markantonakis, Konstantinos, Akram, Raja Naeem, Mayes, Keith |
Conference Name | Proceedings of the 12th International Conference on Availability, Reliability and Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5257-4 |
Keywords | Artificial Ambient Environment, Contactless, experimental analysis, Human Behavior, human behaviour, human factor, human factors, Infrared, Mobile Payments, pubcrawl, Relay Attacks, Two factor Authentication |
Abstract | In the field of smartphones a number of proposals suggest that sensing the ambient environment can act as an effective anti-relay mechanism. However, existing literature is not compliant with industry standards (e.g. EMV and ITSO) that require transactions to complete within a certain time-frame (e.g. 500ms in the case of EMV contactless payments). In previous work the generation of an artificial ambient environment (AAE), and especially the use of infrared light as an AAE actuator was shown to have high success rate in relay attacks detection. In this paper we investigate the application of infrared as a relay attack detection technique in various scenarios, namely, contactless transactions (mobile payments, transportation ticketing, and physical access control), and continuous Two-Factor Authentication. Operating requirements and architectures are proposed for each scenario, while taking into account industry imposed performance requirements, where applicable. Protocols for integrating the solution into the aforementioned scenarios are being proposed, and formally verified. The impact on the performance is assessed through practical implementation. Proposed protocols are verified using Scyther, a formal mechanical verification tool. Finally, additional scenarios, in which this technique can be applied to prevent relay or other types of attacks, are discussed. |
URL | http://doi.acm.org/10.1145/3098954.3098964 |
DOI | 10.1145/3098954.3098964 |
Citation Key | gurulian_artificial_2017 |