Physical layer protection against relay/replay attacks for short-range systems

C Paschou, O Johnson, Z Zhu… - 2023 IEEE Wireless …, 2023 - ieeexplore.ieee.org
In response to the rise of crime in short-range communication systems, a novel method for
authenticating co-located devices is presented. Our method, Channel Randomness Yields …

On the effectiveness of ambient sensing for detecting NFC relay attacks

I Gurulian, C Shepherd, E Frank… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards,
which has resulted in the deployment of various access control, transportation and payment …

[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments

C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …

Proximity assurances based on natural and artificial ambient environments

I Gurulian, K Markantonakis, C Shepherd… - … Security Solutions for …, 2017 - Springer
Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance
of devices involved in a transaction beyond their operating environment. In the field of smart …

[PDF][PDF] Physical Layer Security for Securing Resource-Constrained Networks

C Paschou - 2023 - research-information.bris.ac.uk
Recent developments in society are trending towards the use of large networks comprising a
large number of small devices. Traditional cryptographic techniques are no longer an …

iMight: A Social Group E-wallet With The QR Code and Fingerprint Recognition Technologies

MM Chong, CR Ramachandiran… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
E-wallet is a trending reviews have highlighted that there is a need to develop technology
and is still new in most of the Asian countries. Past reviews have highlighted that there is a …

[PDF][PDF] On Enhancing the Security of Time Constrained Mobile Contactless Transactions

G Iakovos - 2018 - pure.royalholloway.ac.uk
Relay attacks are passive man-in-the-middle attacks during which an attacker is extending
the communication distance of two genuine devices by relaying communication messages …