From Relay Attacks to Distance-Bounding Protocols

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

3 Scopus Citations
View graph of relations

Author(s)

  • Gildas Avoine
  • Ioana Boureanu
  • David Gérault
  • Pascal Lafourcade
  • Christina Onete

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationSecurity of Ubiquitous Computing Systems
Subtitle of host publicationSelected Topics
EditorsGildas Avoine, Julio Hernandez-Castro
PublisherSpringer, Cham
Chapter7
Pages113-130
ISBN (Electronic)978-3-030-10591-4
ISBN (Print)978-3-030-10590-7
Publication statusPublished - 2021

Link(s)

Abstract

We present the concept of relay attacks, and discuss distance-bounding schemes as the main countermeasure. We give details on relaying mechanisms, we review canonical distance-bounding protocols, as well as their threat-model (i.e., covering attacks beyond relaying) stemming from the authentication dimension in distance bounding. Advanced aspects of distance-bounding security are also covered. We conclude by presenting what we consider to be the most important challenges in distance bounding.

Research Area(s)

Citation Format(s)

From Relay Attacks to Distance-Bounding Protocols. / Avoine, Gildas; Boureanu, Ioana; Gérault, David et al.
Security of Ubiquitous Computing Systems: Selected Topics. ed. / Gildas Avoine; Julio Hernandez-Castro. Springer, Cham, 2021. p. 113-130.

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

Download Statistics

No data available