Abstract—Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad–hoc networks, location in-formation can also be used to authenticate devices and users. We will focus on how a prover can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so– called “terrorist fraud attack”. In this paper, we will explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding ...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Distance bounding protocols have been proposed for many security critical applications as a means of...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Abstract. We investigate the problem of verifying location claims of mobile devices, and propose a n...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Abstract—With the growing prevalence of wireless networks, location information plays a critical rol...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
peer reviewedDistance bounding protocols allow a verifier to both authenticate a prover and evaluate...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Distance bounding protocols have been proposed for many security critical applications as a means of...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Abstract. We investigate the problem of verifying location claims of mobile devices, and propose a n...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Abstract—With the growing prevalence of wireless networks, location information plays a critical rol...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
peer reviewedDistance bounding protocols allow a verifier to both authenticate a prover and evaluate...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Distance bounding protocols have been proposed for many security critical applications as a means of...