Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
Secure DRM scheme based on blockchain with high credibility
Z Ma, W Huang, H Gao - Chinese Journal of Electronics, 2018 - Wiley Online Library
Upon the fairness, security and flexibility problems of traditional digital rights management,
we proposed a blockchain infrastructure service based DRM platform with high‐level credit …
we proposed a blockchain infrastructure service based DRM platform with high‐level credit …
White paper on cybersecurity in the healthcare sector. The HEIR solution
The healthcare sector is increasingly vulnerable to cyberattacks due to its growing
digitalization. Patient data, including medical records and financial information, are at risk …
digitalization. Patient data, including medical records and financial information, are at risk …
Comparing distance bounding protocols: A critical mission supported by decision theory
Distance bounding protocols are security countermeasures designed to thwart relay attacks.
Such attacks consist in relaying messages exchanged between two parties, making them …
Such attacks consist in relaying messages exchanged between two parties, making them …
Mutual distance bounding protocols
A distance bounding protocol enables one entity to determine an upper bound on the
physical distance to the other entity as well as to authenticate the other entity. It has been …
physical distance to the other entity as well as to authenticate the other entity. It has been …
Distance bounding with delayed responses
Distance-bounding protocols enable the establishment of an upper bound on the distance
between two communicating parties in such a way that their degree of proximity can be …
between two communicating parties in such a way that their degree of proximity can be …
Physical Layer Protection Against Relay/Replay Attacks for Short-Range Systems
In response to the rise of crime in short-range communication systems, a novel method for
authenticating co-located devices is presented. Our method, Channel Randomness Yields …
authenticating co-located devices is presented. Our method, Channel Randomness Yields …
Distance bounding protocol with adjustable false acceptance rate
DH Yum, JS Kim, SJ Hong… - IEEE Communications …, 2011 - ieeexplore.ieee.org
At Eurocrypt 1993, Brands and Chaum introduced distance bounding protocols to defend
against mafia fraud attack and distance fraud attack. A distance bounding protocol usually …
against mafia fraud attack and distance fraud attack. A distance bounding protocol usually …