Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Distance hijacking attacks on distance bounding protocols
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …
implementations of such protocols have recently started to appear. These protocols are …
Look before you leap: Secure connection bootstrap** for 5g networks to defend against fake base-stations
The lack of authentication protection for bootstrap** messages broadcast by base-stations
makes impossible for devices to differentiate between a legitimate and a fake base-station …
makes impossible for devices to differentiate between a legitimate and a fake base-station …
Distance-bounding protocols: Verification without time and location
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …
bound on the physical distance between the participants. Existing symbolic verification …
Practical and provably secure distance-bounding
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …
relay attacks. Distance bounding protocols are the main practical countermeasure against …
Pasport: A secure and private location proof generation and verification framework
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …
which users submit their location information to service providers in order to gain access to a …
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …
contactless authentication protocols. In this context, verifiers have to authenticate the …
Towards secure distance bounding
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …
many access control and payment schemes. In this work, we present distance-bounding …
A cryptographic analysis of umts/lte aka
Secure communications between mobile subscribers and their associated operator
networks require mutual authentication and key deri-vation protocols. The 3GPP 3 GPP …
networks require mutual authentication and key deri-vation protocols. The 3GPP 3 GPP …