Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Blockchain for secure location verification
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …
illegally access a service or obtain benefit. To address this issue, a number of location proof …
Practical and provably secure distance-bounding
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …
relay attacks. Distance bounding protocols are the main practical countermeasure against …
Pasport: A secure and private location proof generation and verification framework
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …
which users submit their location information to service providers in order to gain access to a …
Towards secure distance bounding
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …
many access control and payment schemes. In this work, we present distance-bounding …
Secure and lightweight distance-bounding
Distance-bounding is a practical solution aiming to prevent relay attacks. The main
challenge when designing such protocols is maintaining their inexpensive cryptographic …
challenge when designing such protocols is maintaining their inexpensive cryptographic …
Survey of distance bounding protocols and threats
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …
technologies allow a tag to communicate without contact with a reader. In wireless …
[LIBRO][B] Security of ubiquitous computing systems: Selected topics
G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …
Challenges in distance bounding
Smartcard-based protocols represent an increasingly large share of the wireless
authentication market, from contactless payments to remote car unlocking. Unfortunately …
authentication market, from contactless payments to remote car unlocking. Unfortunately …
Optimal proximity proofs
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …