The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Distance hijacking attacks on distance bounding protocols

C Cremers, KB Rasmussen, B Schmidt… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …

Distance-bounding protocols: Verification without time and location

S Mauw, Z Smith, J Toro-Pozo… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …

Practical and provably secure distance-bounding

I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - journals.sagepub.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

UWB rapid-bit-exchange system for distance bounding

NO Tippenhauer, H Luecken, M Kuhn… - Proceedings of the 8th …, 2015 - dl.acm.org
Distance bounding protocols enable one device (the verifier) to securely establish an upper
bound on its distance to another device (the prover). These protocols can be used for secure …

A formal approach to distance-bounding RFID protocols

U Dürholz, M Fischlin, M Kasper, C Onete - International Conference on …, 2011 - Springer
Distance-bounding protocols aim at impeding man-in-themiddle (MITM) attacks by
measuring response times. Three kinds of attacks are usually addressed:(1) Mafia attacks …

A novel RFID distance bounding protocol based on physically unclonable functions

S Kardaş, MS Kiraz, MA Bingöl, H Demirci - RFID. Security and Privacy …, 2012 - Springer
Abstract Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (ie,
mafia, terrorist and distance frauds) when they are used for authentication purposes …

A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol

G Avoine, X Bultel, S Gambs, D Gérault… - Proceedings of the …, 2017 - dl.acm.org
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …