After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are historically known as Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. This type of attack poses a serious threat in many practical scenarios. We show that many proposed distance bounding protocols are vulnerable to Distance Hijacking, and we propose solutions to make these protocols resilient to this type of attack. We show that verifying distance bounding protocols using existing informal and...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
A distance bounding protocol enables one party to determine a practical upper bound on the distance ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
In [2], Rasmussen and Capkun present a practical distance verification mechanism and use it to const...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Contactless technologies such as radio-frequency identification, near field communication, and senso...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
A distance bounding protocol enables one party to determine a practical upper bound on the distance ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
In [2], Rasmussen and Capkun present a practical distance verification mechanism and use it to const...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when d...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Contactless technologies such as radio-frequency identification, near field communication, and senso...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
A distance bounding protocol enables one party to determine a practical upper bound on the distance ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...