Security of Distance-Bounding: A Survey

Gildas AVOINE, Muhammed Ali BINGÖL, Ioana BOUREANU, Srdjan ČAPKUN, Gerhard HANCKE, Süleyman KARDAŞ, Chong Hee KIM, Cédric LAURADOUX, Benjamin MARTIN, Jorge MUNILLA, Alberto PEINADO, Kasper BonnE RASMUSSEN, Dave SINGELÉE, Aslan TCHAMKERTEN, Rolando TRUJILLO-RASUA, Serge VAUDENAY

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

87 Citations (Scopus)

Abstract

Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
Original languageEnglish
Article number94
JournalACM Computing Surveys
Volume51
Issue number5
Online publishedSept 2018
DOIs
Publication statusPublished - Dec 2018

Research Keywords

  • Contactless
  • Cryptography
  • Distance fraud
  • Distance-bounding
  • Information security
  • Mafia fraud
  • Proximity check
  • Relay attacks
  • Terrorist fraud

Fingerprint

Dive into the research topics of 'Security of Distance-Bounding: A Survey'. Together they form a unique fingerprint.

Cite this