Survey of distance bounding protocols and threats

A Brelurut, D Gerault, P Lafourcade - … Ferrand, France, October 26-28, 2015 …, 2016 - Springer
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …

Mechanised models and proofs for distance-bounding

I Boureanu, CC Drăgan, F Dupressoir… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
In relay attacks, a man-in-the-middle adversary impersonates a legitimate party and makes it
this party appear to be of an authenticator, when in fact they are not. In order to counteract …

Securing ADS-B with multi-point distance-bounding for UAV collision avoidance

ZP Languell, Q Gu - … International Conference on Mobile Ad Hoc …, 2019 - ieeexplore.ieee.org
The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for
use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging …

A multi-point distance-bounding protocol for securing automatic dependent surveillance-broadcast in unmanned aerial vehicle applications

ZP Languell, Q Gu - Journal of Computer Science and Technology, 2020 - Springer
Abstract The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being
adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for …

Distance-Bounding Protocols

D GÉRAULT, P LAFOURCADE… - … Systems: Control and …, 2024 - books.google.com
In the present day, radio-frequency identification (RFID) and near-field communication
(NFC) technologies, and more generally wireless technologies, are being increasingly …

RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud

R Entezari, H Bahramgiri, M Tajamolian - Computer Communications, 2017 - Elsevier
Distance Bounding (DB) protocol is a lightweight protocol which is used in RFID, NFC and
WSN. These protocols enable an entity to determine an upper bound on the physical …

[PDF][PDF] An RFID unilateral distance bounding protocol and analysis over a noisy channel

R Entezari, H Bahramgiri, M Tajamolian - Int. J. Mechatronics Elect …, 2015 - aeuso.org
Abstract form of automatic identification systems used for humans and objects is radio
frequency identification (RFID). Fast and almost error-free calculations have led to its wide …

Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols

AI Rad, MR Alagheband, SB Far - Journal of information security and …, 2018 - Elsevier
Radio frequency identification (RFID) systems have been used in widespread applications
to identify any object. The growth of wireless systems has caused security and privacy …

[PDF][PDF] Precise and Mechanised Models and Proofs for Distance-Bounding

I Boureanu, CC Dragan, F Dupressoir, D Gerault… - iacr.steepath.eu
Distance-bounding protocols provide a means for a verifier (eg, an RFID reader) to estimate
his relative distance to a prover (eg, a bankcard), in order to counteract relay attacks. We …

[PDF][PDF] Securing the ADS-B protocol for attack-resilient multiple UAV collision avoidance

ZP Languell - 2019 - digital.library.txstate.edu
The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for
use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging …