Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

Practical and provably secure distance-bounding

I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - content.iospress.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Towards secure distance bounding

I Boureanu, A Mitrokotsa, S Vaudenay - Fast Software Encryption: 20th …, 2014 - Springer
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …

Secure and lightweight distance-bounding

I Boureanu, A Mitrokotsa, S Vaudenay - International workshop on …, 2013 - Springer
Distance-bounding is a practical solution aiming to prevent relay attacks. The main
challenge when designing such protocols is maintaining their inexpensive cryptographic …

Survey of distance bounding protocols and threats

A Brelurut, D Gerault, P Lafourcade - … Ferrand, France, October 26-28, 2015 …, 2016 - Springer
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …

[LIBRO][B] Security of ubiquitous computing systems: Selected topics

G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …

Challenges in distance bounding

I Boureanu, S Vaudenay - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Smartcard-based protocols represent an increasingly large share of the wireless
authentication market, from contactless payments to remote car unlocking. Unfortunately …

Optimal proximity proofs

I Boureanu, S Vaudenay - International Conference on Information …, 2014 - Springer
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …