@inproceedings{Issovits2011WeaknessesOfThe,
  author        = {Wolfgang Issovits and Michael Hutter},
  title         = {Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks},
  booktitle     = {Conference on RFID-Technologies and Applications -- RFID-TA 2011, IEEE International Conference, Barcelona, Spain, September 15-16},
  year          = {2011},
  editor        = {Ana Collado and Maurizio Bozzi},
  pages         = {335--342},
  month         = {September},
  publisher     = {IEEE},
  doi           = {10.1109/RFID-TA.2011.6068658},
  url           = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6068658&tag=1}
  abstract      = {RFID and NFC are widely spread contactless communication systems and are commonly used in security-critical applications such as payment and keyless-entry systems. Relay attacks pose a serious threat in this context that are not addressed by most of the RFID applications in use today. The attacks circumvent application-layer security and they cannot be prevented by the usual cryptographic primitives. In this paper, we will present a practical implementation of a relay attack based on systems using the widely used ISO/IEC 14443 standard. We use an off-the-shelf mobile phone and a self-developed RFID-tag emulator that can forward RFID communication over a Bluetooth channel. We will show that the attack succeeded and discuss various methods how to exploit certain mechanisms of the ISO protocol to increase the chance for a successful attack. We will also give recommendations to protect against relay attacks in practice while still complying to the ISO standard which is not considered by most of the proposed countermeasures given in literature.}
}