Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Distance-bounding protocols: Verification without time and location
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …
bound on the physical distance between the participants. Existing symbolic verification …
Modelling and analysis of a hierarchy of distance bounding attacks
We present an extension of the applied pi-calculus that can be used to model distance
bounding protocols. A range of different security properties have been sug-gested for …
bounding protocols. A range of different security properties have been sug-gested for …
[HTML][HTML] On the optimal resistance against mafia and distance fraud in distance-bounding protocols
Distance-bounding protocols are security protocols with a time measurement phase used to
detect relay attacks, whose security is typically measured against mafia-fraud and distance …
detect relay attacks, whose security is typically measured against mafia-fraud and distance …
Two-hop distance-bounding protocols: Keep your friends close
Authentication in wireless communications often depends on the physical proximity to a
location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are …
location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are …
[PDF][PDF] Proving physical proximity using symbolic models
A Debant, S Delaune, C Wiedling - 2018 - hal.science
For many modern applications like eg contactless payment, and keyless systems, ensuring
physical proximity is a security goal of paramount importance. Formal methods have proved …
physical proximity is a security goal of paramount importance. Formal methods have proved …
Lightweight non-distance-bounding means to address RFID relay attacks
Y Tu, S Piramuthu - Decision Support Systems, 2017 - Elsevier
A relay attack is accomplished by simply relaying messages between a prover (eg, an RFID
tag) and a verifier (eg, an RFID reader) with the goal of convincing the verifier of its close …
tag) and a verifier (eg, an RFID reader) with the goal of convincing the verifier of its close …
Post-collusion security and distance bounding
Verification of cryptographic protocols is traditionally built upon the assumption that
participants have not revealed their long-term keys. However, in some cases, participants …
participants have not revealed their long-term keys. However, in some cases, participants …
Software-based remote memory attestation using quantum entanglement
Software-based remote memory attestation is a method for determining the state of a remote
device without relying on secure hardware. In classical computing devices, the method is …
device without relying on secure hardware. In classical computing devices, the method is …
[PDF][PDF] A symbolic framework to analyse physical proximity in security protocols
S Delaune, A Debant, C Wiedling - FSTTCS, 2018 - hal.science
For many modern applications like eg contactless payment, and keyless systems, ensuring
physical proximity is a security goal of paramount importance. Formal methods have proved …
physical proximity is a security goal of paramount importance. Formal methods have proved …