Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …

Secure DRM scheme based on blockchain with high credibility

Z Ma, W Huang, H Gao - Chinese Journal of Electronics, 2018 - Wiley Online Library
Upon the fairness, security and flexibility problems of traditional digital rights management,
we proposed a blockchain infrastructure service based DRM platform with high‐level credit …

White paper on cybersecurity in the healthcare sector. The HEIR solution

K Lampropoulos, A Zarras, E Lakka, P Barmpaki… - arxiv preprint arxiv …, 2023 - arxiv.org
The healthcare sector is increasingly vulnerable to cyberattacks due to its growing
digitalization. Patient data, including medical records and financial information, are at risk …

Comparing distance bounding protocols: A critical mission supported by decision theory

G Avoine, S Mauw, R Trujillo-Rasua - Computer Communications, 2015 - Elsevier
Distance bounding protocols are security countermeasures designed to thwart relay attacks.
Such attacks consist in relaying messages exchanged between two parties, making them …

Mutual distance bounding protocols

G Avoine, CH Kim - IEEE Transactions on Mobile Computing, 2012 - ieeexplore.ieee.org
A distance bounding protocol enables one entity to determine an upper bound on the
physical distance to the other entity as well as to authenticate the other entity. It has been …

Distance bounding with delayed responses

S Lee, JS Kim, SJ Hong, J Kim - IEEE Communications Letters, 2012 - ieeexplore.ieee.org
Distance-bounding protocols enable the establishment of an upper bound on the distance
between two communicating parties in such a way that their degree of proximity can be …

Physical Layer Protection Against Relay/Replay Attacks for Short-Range Systems

C Paschou, O Johnson, Z Zhu… - 2023 IEEE Wireless …, 2023 - ieeexplore.ieee.org
In response to the rise of crime in short-range communication systems, a novel method for
authenticating co-located devices is presented. Our method, Channel Randomness Yields …

Distance bounding protocol with adjustable false acceptance rate

DH Yum, JS Kim, SJ Hong… - IEEE Communications …, 2011 - ieeexplore.ieee.org
At Eurocrypt 1993, Brands and Chaum introduced distance bounding protocols to defend
against mafia fraud attack and distance fraud attack. A distance bounding protocol usually …