Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
The security of autonomous driving: Threats, defenses, and future directions
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …
by releasing the burden of drivers and reducing traffic accidents with more precise control …
Distance hijacking attacks on distance bounding protocols
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …
implementations of such protocols have recently started to appear. These protocols are …
Survivable RFID systems: Issues, challenges, and techniques
Y Zuo - IEEE Transactions on Systems, Man, and Cybernetics …, 2010 - ieeexplore.ieee.org
Radio frequency identification (RFID) technique has been applied in high-security and high-
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …
recently. Unfortunately, they are commonly designed without any formal approach, which …
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Most cryptographic protocols use cryptographic hash functions as a building block. The
security analyses of these protocols typically assume that the hash functions are perfect …
security analyses of these protocols typically assume that the hash functions are perfect …
Distance-bounding protocols: Verification without time and location
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …
bound on the physical distance between the participants. Existing symbolic verification …
Practical and provably secure distance-bounding
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …
relay attacks. Distance bounding protocols are the main practical countermeasure against …
Implementation of terminal middleware platform for mobile RFID computing
N Park - International Journal of Ad Hoc and Ubiquitous …, 2011 - inderscienceonline.com
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal,
comprises RFID tags, which are embedded or attached to objects, an RFID reader and …
comprises RFID tags, which are embedded or attached to objects, an RFID reader and …
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …