The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

DeQoS attack: Degrading quality of service in VANETs and its mitigation

A Yang, J Weng, N Cheng, J Ni, X Lin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we introduce a degradation-of-QoS (DeQoS) attack against vehicular ad hoc
networks (VANETs). Through DeQoS, the attacker can relay the authentication exchanges …

Practical and provably secure distance-bounding

I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - content.iospress.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …

Survey of distance bounding protocols and threats

A Brelurut, D Gerault, P Lafourcade - … Ferrand, France, October 26-28, 2015 …, 2016 - Springer
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …

Efficient, secure, private distance bounding without key updates

J Hermans, R Peeters, C Onete - … of the sixth ACM conference on …, 2013 - dl.acm.org
We propose a new distance bounding protocol, which builds upon the private RFID
authentication protocol by Peeters and Hermans [25]. In contrast to most distance-bounding …

Two-hop distance-bounding protocols: Keep your friends close

A Yang, E Pagnin, A Mitrokotsa… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Authentication in wireless communications often depends on the physical proximity to a
location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are …

Subtle kinks in distance-bounding: an analysis of prominent protocols

M Fischlin, C Onete - Proceedings of the sixth ACM conference on …, 2013 - dl.acm.org
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response
times. The four attacks such protocols typically address, recently formalized in [10], are:(1) …

HB+ DB: Distance bounding meets human based authentication

E Pagnin, A Yang, Q Hu, G Hancke… - Future Generation …, 2018 - Elsevier
Authentication for resource-constrained devices is seen as one of the major challenges in
current wireless communication networks. The HB+ protocol by Juels and Weis provides …

Otp-iot: an ownership transfer protocol for the internet of things

MSI Mamun, C Su, A Yang, A Miyaji… - Journal of information …, 2018 - Elsevier
An RFID ownership transfer protocol enables a tag owner to transfer the ownership of the
tag to a new owner. While there have been a large number of such protocols in the literature …

Matching in proximity authentication and mobile payment ecosystem: What are we missing?

Y Zhuang, ACM Leung, J Hughes - … 2, 2016, Revised Selected Papers 12, 2017 - Springer
During the past decade, cybersecurity threats have drawn everyone's attention and it's
becoming a national priority in many leading countries. With the development of …