Relay attack
Encyclopedia
A Relay attack is a type of attack related to man-in-the-middle
Man-in-the-middle attack
In cryptography, the man-in-the-middle attack , bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other...

 and replay
Replay attack
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet...

 attacks, in which an attacker relays verbatim a message from the sender to a valid receiver of the message. The sender may or may not be aware of even sending the message to the attacker; if the sender is aware, it is likely under the impression that the attacker is the intended receiver of the message.

Relay attacks are forecast to get more and more common with the increasing number of contactless (RLC and Radio frequency
Radio frequency
Radio frequency is a rate of oscillation in the range of about 3 kHz to 300 GHz, which corresponds to the frequency of radio waves, and the alternating currents which carry radio signals...

) devices.

Example attack

A typical relay attack is when a hacker
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

follows a car owner with a relay that forwards the frequency of the alarm's remote control to the car, waiting for the car owner to accidentally press the open button during his jogging, if pressing a button is necessary (for security reasons, it should be necessary, but for convenience of the owner and the hacker, it is often not necessary).

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK