Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
BANDANA—Body area network device-to-device authentication using natural gAit
Secure spontaneous authentication between devices worn at arbitrary locations on the
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Security and privacy implications of NFC-enabled contactless payment systems
N Akinyokun, V Teague - … of the 12th international conference on …, 2017 - dl.acm.org
Nowadays, contactless payments are becoming increasingly common as new smartphones,
tablets, point-of-sale (POS) terminals and payment cards (often termed" tap-and-pay" cards) …
tablets, point-of-sale (POS) terminals and payment cards (often termed" tap-and-pay" cards) …
Man-in-the-middle attack on contactless payment over NFC communications: design, implementation, experiments and detection
A recent development emanating from RFID technology is Near Field Communication
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …
Contactless Credit Cards Payment Fraud Protection by Ambient Authentication
In recent years, improvements to the computational ability of mobile phones and support for
near-field-communication have enabled transactions to be performed by using mobile …
near-field-communication have enabled transactions to be performed by using mobile …
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
Mobile off-line payment enables purchase over the counter even in the absence of reliable
network connections. Popular solutions proposed by leading payment service providers (eg …
network connections. Popular solutions proposed by leading payment service providers (eg …
Context-based co-presence detection techniques: A survey
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
What is this sensor and does this app need access to it?
Mobile sensors have already proven to be helpful in different aspects of people's everyday
lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors …
lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors …