Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Distance hijacking attacks on distance bounding protocols

C Cremers, KB Rasmussen, B Schmidt… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …

Look before you leap: Secure connection bootstrap** for 5g networks to defend against fake base-stations

A Singla, R Behnia, SR Hussain, A Yavuz… - Proceedings of the 2021 …, 2021 - dl.acm.org
The lack of authentication protection for bootstrap** messages broadcast by base-stations
makes impossible for devices to differentiate between a legitimate and a fake base-station …

Distance-bounding protocols: Verification without time and location

S Mauw, Z Smith, J Toro-Pozo… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …

Practical and provably secure distance-bounding

I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - content.iospress.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …

A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol

G Avoine, X Bultel, S Gambs, D Gérault… - Proceedings of the …, 2017 - dl.acm.org
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …

Towards secure distance bounding

I Boureanu, A Mitrokotsa, S Vaudenay - Fast Software Encryption: 20th …, 2014 - Springer
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …

A cryptographic analysis of umts/lte aka

S Alt, PA Fouque, G Macario-Rat, C Onete… - … Conference on Applied …, 2016 - Springer
Secure communications between mobile subscribers and their associated operator
networks require mutual authentication and key deri-vation protocols. The 3GPP 3 GPP …