Authors
Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Čapkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay
Publication date
2018/9/25
Source
ACM Computing Surveys (CSUR)
Volume
51
Issue
5
Pages
1-33
Publisher
ACM
Description
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
Total citations
20172018201920202021202220232024185171812174
Scholar articles
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke… - ACM Computing Surveys (CSUR), 2018