Emerging terahertz integrated systems in silicon

X Yi, C Wang, Z Hu, JW Holloway… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Silicon-based terahertz (THz) integrated circuits (ICs) have made rapid progress over the
past decade. The demonstrated basic component performance, as well as the maturity of …

A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol

G Avoine, X Bultel, S Gambs, D Gérault… - Proceedings of the …, 2017 - dl.acm.org
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …

CMOS THz-ID: A 1.6-mm² package-less identification tag using asymmetric cryptography and 260-GHz far-field backscatter communication

MIW Khan, MI Ibrahim, CS Juvekar… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
This article presents an ultra-small, high-security identification tag that is entirely built in a
CMOS chip without external components. The usage of backscatter communications at 260 …

Towards secure distance bounding

I Boureanu, A Mitrokotsa, S Vaudenay - Fast Software Encryption: 20th …, 2014 - Springer
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …

Beyond crypto: Physical-layer security for Internet of Things devices

RT Yazicigil, PM Nadeau, DD Richman… - IEEE Solid-State …, 2020 - ieeexplore.ieee.org
The boom of connected Internet of Things (IoT) nodes and ubiquity of wireless
communications are projected to increase wireless data traffic by several orders of …

A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things

A Kumar, K Gopal, A Aggarwal - International Journal of …, 2017 - inderscienceonline.com
A mobile ad-hoc network (MANET) is a group of low power computing mobile and wireless
devices which cooperatively form an infrastructure-less and decentralised network. Scarcity …

Survey of distance bounding protocols and threats

A Brelurut, D Gerault, P Lafourcade - … Ferrand, France, October 26-28, 2015 …, 2016 - Springer
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …

{NFCGate}: Opening the Door for {NFC} Security Research with a {Smartphone-Based} Toolkit

S Klee, A Roussos, M Maass, M Hollick - 14th USENIX Workshop on …, 2020 - usenix.org
Near Field Communication (NFC) is being used in a variety of security-critical applications,
from access control to payment systems. However, NFC protocol analysis typically requires …

Prover anonymous and deniable distance-bounding authentication

S Gambs, C Onete, JM Robert - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
In distance-bounding authentication protocols, a verifier assesses that a prover is (1)
legitimate and (2) in the verifier's proximity. Proximity checking is done by running time …

Challenges in distance bounding

I Boureanu, S Vaudenay - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Smartcard-based protocols represent an increasingly large share of the wireless
authentication market, from contactless payments to remote car unlocking. Unfortunately …