Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Distance-bounding protocols: Verification without time and location

S Mauw, Z Smith, J Toro-Pozo… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …

Modelling and analysis of a hierarchy of distance bounding attacks

T Chothia, J De Ruiter, B Smyth - 27th USENIX Security Symposium …, 2018 - usenix.org
We present an extension of the applied pi-calculus that can be used to model distance
bounding protocols. A range of different security properties have been sug-gested for …

[HTML][HTML] On the optimal resistance against mafia and distance fraud in distance-bounding protocols

R Gil-Pons, S Mauw, R Trujillo-Rasua - Computer Communications, 2023 - Elsevier
Distance-bounding protocols are security protocols with a time measurement phase used to
detect relay attacks, whose security is typically measured against mafia-fraud and distance …

Two-hop distance-bounding protocols: Keep your friends close

A Yang, E Pagnin, A Mitrokotsa… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Authentication in wireless communications often depends on the physical proximity to a
location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are …

[PDF][PDF] Proving physical proximity using symbolic models

A Debant, S Delaune, C Wiedling - 2018 - hal.science
For many modern applications like eg contactless payment, and keyless systems, ensuring
physical proximity is a security goal of paramount importance. Formal methods have proved …

Lightweight non-distance-bounding means to address RFID relay attacks

Y Tu, S Piramuthu - Decision Support Systems, 2017 - Elsevier
A relay attack is accomplished by simply relaying messages between a prover (eg, an RFID
tag) and a verifier (eg, an RFID reader) with the goal of convincing the verifier of its close …

Post-collusion security and distance bounding

S Mauw, Z Smith, J Toro-Pozo… - Proceedings of the 2019 …, 2019 - dl.acm.org
Verification of cryptographic protocols is traditionally built upon the assumption that
participants have not revealed their long-term keys. However, in some cases, participants …

Software-based remote memory attestation using quantum entanglement

J Laeuchli, R Trujillo-Rasua - Quantum Information Processing, 2024 - Springer
Software-based remote memory attestation is a method for determining the state of a remote
device without relying on secure hardware. In classical computing devices, the method is …

[PDF][PDF] A symbolic framework to analyse physical proximity in security protocols

S Delaune, A Debant, C Wiedling - FSTTCS, 2018 - hal.science
For many modern applications like eg contactless payment, and keyless systems, ensuring
physical proximity is a security goal of paramount importance. Formal methods have proved …