In relay attacks, a man-in-the-middle adversary impersonates a legitimate party and makes it this party appear to be of an authenticator, when in fact they are not. In order to counteract …
ZP Languell, Q Gu - … International Conference on Mobile Ad Hoc …, 2019 - ieeexplore.ieee.org
The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging …
ZP Languell, Q Gu - Journal of Computer Science and Technology, 2020 - Springer
Abstract The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for …
In the present day, radio-frequency identification (RFID) and near-field communication (NFC) technologies, and more generally wireless technologies, are being increasingly …
Distance Bounding (DB) protocol is a lightweight protocol which is used in RFID, NFC and WSN. These protocols enable an entity to determine an upper bound on the physical …
Abstract form of automatic identification systems used for humans and objects is radio frequency identification (RFID). Fast and almost error-free calculations have led to its wide …
Radio frequency identification (RFID) systems have been used in widespread applications to identify any object. The growth of wireless systems has caused security and privacy …
Distance-bounding protocols provide a means for a verifier (eg, an RFID reader) to estimate his relative distance to a prover (eg, a bankcard), in order to counteract relay attacks. We …
The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging …