DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 161
1.
  • On addressing RFID/NFC-base... On addressing RFID/NFC-based relay attacks: An overview
    Tu, Yu-Ju; Piramuthu, Selwyn Decision Support Systems, February 2020, 2020-02-00, 20200201, Volume: 129
    Journal Article
    Peer reviewed

    Relay attacks generally occur between two entities that communicate with each other through wireless means. When a relay attack between a honest prover and a honest verifier occurs, an adversary ...
Full text
Available for: UL
2.
  • Sub-GHz Two-Way Ranging Bas... Sub-GHz Two-Way Ranging Based on Phase Detection for Remote Keyless Entry Systems
    Seto, Ichiro; Otaka, Shoji; Yoshida, Hiroshi ... IEEE transactions on vehicular technology, 2022-Sept., 2022-9-00, Volume: 71, Issue: 9
    Journal Article
    Peer reviewed

    Remote keyless entry systems have penetrated the vehicular market due to its convenience. However, its vulnerability against relay attacks exploiting the wireless channel is a serious threat. One of ...
Full text
Available for: UL
3.
  • BackProx : Secure Backscatt... BackProx : Secure Backscatter-Assisted Proximity Detection for Passive Keyless Entry and Start Systems
    Park, Hoorin; Hong, Jeongkyu Sensors (Basel, Switzerland), 02/2023, Volume: 23, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    A passive keyless entry and start (PKES) system is an electronic lock for an automobile that provides the great convenience of opening the door when the user is in proximity. However, the system ...
Full text
Available for: UL
4.
  • Context-based Co-presence d... Context-based Co-presence detection techniques: A survey
    Conti, Mauro; Lal, Chhagan Computers & security, January 2020, 2020-01-00, 20200101, Volume: 88
    Journal Article
    Peer reviewed
    Open access

    In this paper, we present a systematic survey on the contextual information based proximity detection techniques. These techniques are heavily used for improving security and usability in ...
Full text
Available for: UL
5.
  • Revisiting Error-Correction... Revisiting Error-Correction in Precommitment Distance-Bounding Protocols
    Zhang, Jingyi; Yang, Anjia; Hu, Qiao ... IEEE transactions on industrial informatics, 10/2022, Volume: 18, Issue: 10
    Journal Article

    Distance-bounding (DB) protocols are used to verify the physical proximity of two devices. DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things, e.g., nodes can ...
Full text
Available for: UL
6.
  • Confidence in smart token p... Confidence in smart token proximity: Relay attacks revisited
    Hancke, G.P.; Mayes, K.E.; Markantonakis, K. Computers & security, 10/2009, Volume: 28, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Contactless and contact smart card systems use the physical constraints of the communication channel to implicitly prove the proximity of a token. These systems, however, are potentially vulnerable ...
Full text
Available for: UL

PDF
7.
  • An Efficient Distance Bound... An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
    Avoine, Gildas; Tchamkerten, Aslan Information Security
    Book Chapter
    Peer reviewed

    The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an authentication process between a verifier and a remote legitimate prover. This attack is a major ...
Full text
8.
  • Tangible security: Survey o... Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
    Hu, Qiao; Zhang, Jingyi; Mitrokotsa, Aikaterini ... Computers & security, 09/2018, Volume: 78
    Journal Article
    Peer reviewed
    Open access

    •Physical context can enables proximity verification and key establishment.•We classify and survey the main approaches to security with physical context.•We survey practical, experimentally verified ...
Full text
Available for: UL

PDF
9.
  • Rethinking Tag Collisions f... Rethinking Tag Collisions for Replay and Relay Attack Resistance in Backscatter Networks
    Park, Hoorin; Lee, Wonjun IEEE access, 01/2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    Distinguishable physical layer features of radio frequency have the potential to serve as new fingerprints for authentication in backscatter networks. They have a definite advantage that backscatter ...
Full text
Available for: UL
10.
  • Deep-Learning-Aided RF Fing... Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection
    Wang, Yifeng; Zou, Junwei; Zhang, Kai Electronics (Basel), 02/2023, Volume: 12, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Near field communication (NFC) has been a widely used radiofrequency identification (RFID) technology, credited to its convenience and security features. However, the transmitted signals can be ...
Full text
Available for: UL
1 2 3 4 5
hits: 161

Load filters