Revisiting error-correction in precommitment distance-bounding protocols

J Zhang, A Yang, Q Hu, GP Hancke… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Distance-bounding (DB) protocols are used to verify the physical proximity of two devices.
DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things …

Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

H Jannati - International Journal of Critical Infrastructure Protection, 2015 - Elsevier
Abstract Radio Frequency Identification (RFID) technology is used in myriad applications
because of its speed of execution, ease of manufacturing and usability. In the domain of …

Building ToF Resiliency Into UWB-Based Secure Distance Bounding Protocols

RE Nkrow, D Boshoff, BJ Silva, Z Liu… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Verification of the physical proximity of a communication party, together with authentication,
is an important requirement for system security. For example, in contactless payments, the …

An RFID search protocol secured against relay attack based on distance bounding approach

H Jannati, A Falahati - Wireless Personal Communications, 2015 - Springer
RFID search protocols are suggested for the past decade to efficiently find a specific tag
among a large number of tags by a reader. For instance, in a pharmacy, according to a …

Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks

H Jannati, A Falahati - Wireless personal communications, 2014 - Springer
In order to protect a wireless sensor network and an RFID system against wormhole and
relay attacks respectively, distance bounding protocols are suggested for the past decade. In …

A distance bounding protocol for location-cloaked applications

C Molina-Martínez, P Galdames, C Duran-Faundez - Sensors, 2018 - mdpi.com
Location-based services (LBSs) assume that users are willing to release trustworthy and
useful details about their whereabouts. However, many location privacy concerns have …

Security implications of implementing multistate distance-bounding protocols

J Zhang, A Yang, Q Hu, GP Hancke - … of the ACM Workshop on Cyber …, 2019 - dl.acm.org
A number of distance-bounding protocols have proposed multistate exchanges. In theory
this can potentially improve the security of the protocol when using the same number of …

Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel

H Jannati, A Falahati - Information Processing Letters, 2015 - Elsevier
To protect RFID systems against the relay attack, distance bounding protocols are proposed
based upon the round trip time measurements of the executed messages. With such …

A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel

E Shafiee, A Falahati - International Journal of Ad Hoc and …, 2021 - inderscienceonline.com
It is common to employ the distance bounding (DB) protocols to prevent relay attacks over
RFID communication systems. It is impossible to utilise only one specific version of a DB …