Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Confidence in smart token proximity: Relay attacks revisited

GP Hancke, KE Mayes, K Markantonakis - Computers & Security, 2009 - Elsevier
Contactless and contact smart card systems use the physical constraints of the
communication channel to implicitly prove the proximity of a token. These systems, however …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

[HTML][HTML] Classifying RFID attacks and defenses

A Mitrokotsa, MR Rieback, AS Tanenbaum - Information Systems Frontiers, 2010 - Springer
Abstract RFID (Radio Frequency Identification) systems are one of the most pervasive
computing technologies with technical potential and profitable opportunities in a diverse …

Distance hijacking attacks on distance bounding protocols

C Cremers, KB Rasmussen, B Schmidt… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …

The swiss-knife RFID distance bounding protocol

CH Kim, G Avoine, F Koeune, FX Standaert… - Information Security and …, 2009 - Springer
Relay attacks are one of the most challenging threats RFID will have to face in the close
future. They consist in making the verifier believe that the prover is in its close vicinity by …

Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels

J Munilla, A Peinado - Wireless communications and mobile …, 2008 - Wiley Online Library
RFID systems are vulnerable to different attacks related to the location; distance fraud attack,
relay attack and terrorist attack. The main countermeasure against these attacks is the use of …

A framework for analyzing RFID distance bounding protocols

G Avoine, MA Bingöl, S Kardaş… - Journal of …, 2011 - content.iospress.com
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …

STAMP: Enabling privacy-preserving location proofs for mobile users

X Wang, A Pande, J Zhu… - IEEE/ACM transactions …, 2016 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services
based on users' current location, many potential services rely on users' location history, or …

An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement

G Avoine, A Tchamkerten - … : 12th International Conference, ISC 2009, Pisa …, 2009 - Springer
The Mafia fraud consists in an adversary transparently relaying the physical layer signal
during an authentication process between a verifier and a remote legitimate prover. This …