Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

Distance hijacking attacks on distance bounding protocols

C Cremers, KB Rasmussen, B Schmidt… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …

Survivable RFID systems: Issues, challenges, and techniques

Y Zuo - IEEE Transactions on Systems, Man, and Cybernetics …, 2010 - ieeexplore.ieee.org
Radio frequency identification (RFID) technique has been applied in high-security and high-
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …

A framework for analyzing RFID distance bounding protocols

G Avoine, MA Bingöl, S Kardaş… - Journal of …, 2011 - content.iospress.com
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

V Cheval, C Cremers, A Dax, L Hirschi… - 32nd USENIX Security …, 2023 - usenix.org
Most cryptographic protocols use cryptographic hash functions as a building block. The
security analyses of these protocols typically assume that the hash functions are perfect …

Distance-bounding protocols: Verification without time and location

S Mauw, Z Smith, J Toro-Pozo… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …

Practical and provably secure distance-bounding

I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - content.iospress.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …

Implementation of terminal middleware platform for mobile RFID computing

N Park - International Journal of Ad Hoc and Ubiquitous …, 2011 - inderscienceonline.com
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal,
comprises RFID tags, which are embedded or attached to objects, an RFID reader and …

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …