Abstract
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
| Original language | English |
|---|---|
| Article number | 94 |
| Journal | ACM Computing Surveys |
| Volume | 51 |
| Issue number | 5 |
| Online published | Sept 2018 |
| DOIs | |
| Publication status | Published - Dec 2018 |
Research Keywords
- Contactless
- Cryptography
- Distance fraud
- Distance-bounding
- Information security
- Mafia fraud
- Proximity check
- Relay attacks
- Terrorist fraud