H Jannati - International Journal of Critical Infrastructure Protection, 2015 - Elsevier
Abstract Radio Frequency Identification (RFID) technology is used in myriad applications because of its speed of execution, ease of manufacturing and usability. In the domain of …
Verification of the physical proximity of a communication party, together with authentication, is an important requirement for system security. For example, in contactless payments, the …
RFID search protocols are suggested for the past decade to efficiently find a specific tag among a large number of tags by a reader. For instance, in a pharmacy, according to a …
In order to protect a wireless sensor network and an RFID system against wormhole and relay attacks respectively, distance bounding protocols are suggested for the past decade. In …
Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have …
J Zhang, A Yang, Q Hu, GP Hancke - … of the ACM Workshop on Cyber …, 2019 - dl.acm.org
A number of distance-bounding protocols have proposed multistate exchanges. In theory this can potentially improve the security of the protocol when using the same number of …
To protect RFID systems against the relay attack, distance bounding protocols are proposed based upon the round trip time measurements of the executed messages. With such …
E Shafiee, A Falahati - International Journal of Ad Hoc and …, 2021 - inderscienceonline.com
It is common to employ the distance bounding (DB) protocols to prevent relay attacks over RFID communication systems. It is impossible to utilise only one specific version of a DB …