Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

BANDANA—Body area network device-to-device authentication using natural gAit

D Schürmann, A Brüsch, S Sigg… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure spontaneous authentication between devices worn at arbitrary locations on the
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Security and privacy implications of NFC-enabled contactless payment systems

N Akinyokun, V Teague - … of the 12th international conference on …, 2017 - dl.acm.org
Nowadays, contactless payments are becoming increasingly common as new smartphones,
tablets, point-of-sale (POS) terminals and payment cards (often termed" tap-and-pay" cards) …

Man-in-the-middle attack on contactless payment over NFC communications: design, implementation, experiments and detection

S Akter, S Chellappan, T Chakraborty… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A recent development emanating from RFID technology is Near Field Communication
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …

Contactless Credit Cards Payment Fraud Protection by Ambient Authentication

MH Yang, JN Luo, M Vijayalakshmi, SM Shalinie - Sensors, 2022 - mdpi.com
In recent years, improvements to the computational ability of mobile phones and support for
near-field-communication have enabled transactions to be performed by using mobile …

Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment

X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang… - 26th USENIX Security …, 2017 - usenix.org
Mobile off-line payment enables purchase over the counter even in the absence of reliable
network connections. Popular solutions proposed by leading payment service providers (eg …

Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

What is this sensor and does this app need access to it?

M Mehrnezhad, E Toreini - Informatics, 2019 - mdpi.com
Mobile sensors have already proven to be helpful in different aspects of people's everyday
lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors …