International audienceNFC and RFID are technologies that are more and more present in our life. These technologies allow a tag to communicate without contact with a reader. In wireless communication an intruder can always listen and forward a signal, so he can mount a so-called worm hole attack. In the last decades, several Distance Bounding (DB) protocols have been introduced to avoid such attacks. In this context, there exist several threat models: Terrorist Fraud, Mafia Fraud, Distance Fraud etc. We first show the links between the existing threat models. Then we list more than forty DB protocols and give the bounds of the best known attacks for different threat models. In some cases, we explain how we are able to improve existing attack...
After several years of theoretical research on distance bounding protocols, the first implementation...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and t...
Distance-bounding protocols aim at impeding man-in-themiddle( MITM) attacks by measuring response ti...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and te...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Un...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
International audienceMany distance bounding protocols appropriate for the RFID technology have been...
After several years of theoretical research on distance bounding protocols, the first implementation...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and t...
Distance-bounding protocols aim at impeding man-in-themiddle( MITM) attacks by measuring response ti...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and te...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Un...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
International audienceMany distance bounding protocols appropriate for the RFID technology have been...
After several years of theoretical research on distance bounding protocols, the first implementation...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
After several years of theoretical research on distance bounding protocols, the first implementation...
After several years of theoretical research on distance bounding protocols, the first implementation...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which a...