Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices
(IMDs). Our scheme is based on ultrasonic distance-bounding and enables an implanted …
(IMDs). Our scheme is based on ultrasonic distance-bounding and enables an implanted …
Distance hijacking attacks on distance bounding protocols
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …
implementations of such protocols have recently started to appear. These protocols are …
The swiss-knife RFID distance bounding protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close
future. They consist in making the verifier believe that the prover is in its close vicinity by …
future. They consist in making the verifier believe that the prover is in its close vicinity by …
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …
recently. Unfortunately, they are commonly designed without any formal approach, which …
An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement
G Avoine, A Tchamkerten - … : 12th International Conference, ISC 2009, Pisa …, 2009 - Springer
The Mafia fraud consists in an adversary transparently relaying the physical layer signal
during an authentication process between a verifier and a remote legitimate prover. This …
during an authentication process between a verifier and a remote legitimate prover. This …
RFID distance bounding protocol with mixed challenges to prevent relay attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud
and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this …
and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this …
Practical and provably secure distance-bounding
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …
relay attacks. Distance bounding protocols are the main practical countermeasure against …
Attacks on time-of-flight distance bounding channels
Cryptographic distance-bounding protocols verify the proximity of two parties by timing a
challenge-response exchange. Such protocols rely on the underlying communication …
challenge-response exchange. Such protocols rely on the underlying communication …
Distance bounding with IEEE 802.15. 4a: Attacks and countermeasures
M Poturalski, M Flury, P Papadimitratos… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15. 4a, is a
primary candidate for implementing distance bounding protocols, thanks to its ability to …
primary candidate for implementing distance bounding protocols, thanks to its ability to …