Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which location verification protocols may be vulnerable
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
In this paper, we analyze the security of two recently proposed distance bounding protocols called t...
Given the requirements of fast processing and the complexity of RF ranging systems, distance boundin...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
In [2], Rasmussen and Capkun present a practical distance verification mechanism and use it to const...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Contactless technologies such as radio-frequency identification, near field communication, and senso...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
In this paper, we analyze the security of two recently proposed distance bounding protocols called t...
Given the requirements of fast processing and the complexity of RF ranging systems, distance boundin...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance ...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
In [2], Rasmussen and Capkun present a practical distance verification mechanism and use it to const...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Contactless technologies such as radio-frequency identification, near field communication, and senso...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
In this paper, we analyze the security of two recently proposed distance bounding protocols called t...
Given the requirements of fast processing and the complexity of RF ranging systems, distance boundin...