Visible to the public Artificial Ambient Environments for Proximity Critical Applications

TitleArtificial Ambient Environments for Proximity Critical Applications
Publication TypeConference Paper
Year of Publication2017
AuthorsGurulian, Iakovos, Markantonakis, Konstantinos, Akram, Raja Naeem, Mayes, Keith
Conference NameProceedings of the 12th International Conference on Availability, Reliability and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5257-4
KeywordsArtificial Ambient Environment, Contactless, experimental analysis, Human Behavior, human behaviour, human factor, human factors, Infrared, Mobile Payments, pubcrawl, Relay Attacks, Two factor Authentication
Abstract

In the field of smartphones a number of proposals suggest that sensing the ambient environment can act as an effective anti-relay mechanism. However, existing literature is not compliant with industry standards (e.g. EMV and ITSO) that require transactions to complete within a certain time-frame (e.g. 500ms in the case of EMV contactless payments). In previous work the generation of an artificial ambient environment (AAE), and especially the use of infrared light as an AAE actuator was shown to have high success rate in relay attacks detection. In this paper we investigate the application of infrared as a relay attack detection technique in various scenarios, namely, contactless transactions (mobile payments, transportation ticketing, and physical access control), and continuous Two-Factor Authentication. Operating requirements and architectures are proposed for each scenario, while taking into account industry imposed performance requirements, where applicable. Protocols for integrating the solution into the aforementioned scenarios are being proposed, and formally verified. The impact on the performance is assessed through practical implementation. Proposed protocols are verified using Scyther, a formal mechanical verification tool. Finally, additional scenarios, in which this technique can be applied to prevent relay or other types of attacks, are discussed.

URLhttp://doi.acm.org/10.1145/3098954.3098964
DOI10.1145/3098954.3098964
Citation Keygurulian_artificial_2017