{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:34:48Z","timestamp":1776335688387,"version":"3.51.2"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030105907","type":"print"},{"value":"9783030105914","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We present the concept of relay attacks, and discuss distance-bounding schemes as the main countermeasure. We give details on relaying mechanisms, we review canonical distance-bounding protocols, as well as their threat-model (i.e., covering attacks beyond relaying) stemming from the authentication dimension in distance bounding. Advanced aspects of distance-bounding security are also covered. We conclude by presenting what we consider to be the most important challenges in distance bounding.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_7","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"113-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["From Relay Attacks to Distance-Bounding Protocols"],"prefix":"10.1007","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[]},{"given":"Ioana","family":"Boureanu","sequence":"additional","affiliation":[]},{"given":"David","family":"G\u00e9rault","sequence":"additional","affiliation":[]},{"given":"Gerhard P.","family":"Hancke","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Gildas Avoine, Muhammed Ali Bing\u00f6l, Ioana Boureanu, Srdjan \u010dapkun, Gerhard Hancke, S\u00fcleyman Karda\u015f, Chong Hee Kim, C\u00e9dric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singel\u00e9e, Aslan Tchamkerten, Rolando Trujillo-Rasua, and Serge Vaudenay. Security of distance-bounding: A survey. ACM Comput. Surv., 51(5):94:1\u201394:33, September 2018.","DOI":"10.1145\/3264628"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Gildas Avoine, Muhammed Ali Bing\u00f6l, S\u00fcleyman Karda\u015f, C\u00e9dric Lauradoux, and Benjamin Martin. A formal framework for analyzing RFID distance bounding protocols. In Journal of Computer Security - Special Issue on RFID System Security, 2010, volume 19, pages 289\u2013317, 2011.","DOI":"10.3233\/JCS-2010-0408"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Gildas Avoine, Xavier Bultel, S\u00e9bastien Gambs, David G\u00e9rault, Pascal Lafourcade, Cristina Onete, and Jean-Marc Robert. A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol. In ACM on Asia Conference on Computer and Communications Security, ASIA CCS \u201917, pages 800\u2013814, New York, NY, USA, 2017. ACM.","DOI":"10.1145\/3052973.3053000"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Gildas Avoine and Aslan Tchamkerten. An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement. In International Conference on Information Security (ISC) 2009, volume 5735 of Lecture Notes in Computer Science, pages 250\u2013261. Springer, 2009.","DOI":"10.1007\/978-3-642-04474-8_21"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"Asl\u0131 Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, and Serge Vaudenay. The bussard-bagga and other distance-bounding protocols under attacks. In Miros\u0142aw Kuty\u0142owski and Moti Yung, editors, Information Security and Cryptology, pages 371\u2013391. Springer, 2013.","DOI":"10.1007\/978-3-642-38519-3_23"},{"issue":"3","key":"7_CR74","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BF00196726","volume":"4","author":"Samy Bengio","year":"1991","unstructured":"Samy Bengio, Gilles Brassard, Yvo G. Desmedt, Claude Goutier, and Jean-Jacques Quisquater. Secure implementation of identification systems. Journal of Cryptology, 4(3):175\u2013183, January 1991.","journal-title":"Journal of Cryptology"},{"key":"7_CR83","doi-asserted-by":"crossref","unstructured":"Thomas Beth and Yvo Desmedt. Identification tokens \u2013 or: Solving the chess grandmaster problem. In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Cryptology-CRYPT0\u2019 90, pages 169\u2013176. Springer, 1991.","DOI":"10.1007\/3-540-38424-3_12"},{"key":"7_CR93","unstructured":"Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In IEEE Computer Security Foundations Workshop, pages 82\u201396, Novia Scotia, Canada, 2001. IEEE."},{"key":"7_CR107","unstructured":"Ioana Boureanu, David Gerault, and Pascal Lafourcade. Fine-grained and application-ready distance-bounding security. Cryptology ePrint Archive, Report 2018\/384, 2018."},{"key":"7_CR108","doi-asserted-by":"crossref","unstructured":"Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. On the pseudorandom function assumption in (secure) distance-bounding protocols. In Alejandro Hevia and Gregory Neven, editors, Progress in Cryptology \u2013 LATINCRYPT 2012, pages 100\u2013120. Springer, 2012.","DOI":"10.1007\/978-3-642-33481-8_6"},{"key":"7_CR109","doi-asserted-by":"crossref","unstructured":"Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. Towards secure distance bounding. In Fast Software Encryption - 20th International Workshop, FSE 2013, pages 55\u201367, Singapore, March 2013.","DOI":"10.1007\/978-3-662-43933-3_4"},{"key":"7_CR110","doi-asserted-by":"crossref","unstructured":"Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. Practical and provably secure distance-bounding. In Yvo Desmedt, editor, Information Security, pages 248\u2013258, Cham, 2015. Springer.","DOI":"10.1007\/978-3-319-27659-5_18"},{"key":"7_CR111","doi-asserted-by":"crossref","unstructured":"Ioana Boureanu and Serge Vaudenay. Optimal proximity proofs. In Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13\u201315, 2014, Revised Selected Papers, pages 170\u2013190, 2014.","DOI":"10.1007\/978-3-319-16745-9_10"},{"key":"7_CR113","doi-asserted-by":"crossref","unstructured":"Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Advances in Cryptology \u2013 EUROCRYPT \u201993, volume 765 of Lecture Notes in Computer Science, pages 344\u2013359. Springer, 1994.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"7_CR114","doi-asserted-by":"crossref","unstructured":"Agn\u00e8s Brelurut, David Gerault, and Pascal Lafourcade. Survey of distance bounding protocols and threats. In Joaquin Garcia-Alfaro, Evangelos Kranakis, and Guillaume Bonfante, editors, Foundations and Practice of Security, pages 29\u201349, Cham, 2016. Springer.","DOI":"10.1007\/978-3-319-30303-1_3"},{"key":"7_CR118","doi-asserted-by":"crossref","unstructured":"Xavier Bultel, S\u00e9bastien Gambs, David G\u00e9rault, Pascal Lafourcade, Cristina Onete, and Jean-Marc Robert. A prover-anonymous and terrorist-fraud resistant distance-bounding protocol. In ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec \u201916, pages 121\u2013133, New York, NY, USA, 2016. ACM.","DOI":"10.1145\/2939918.2939919"},{"key":"7_CR133","doi-asserted-by":"crossref","unstructured":"Nishanth Chandran, Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky. Position based cryptography. In International Cryptology Conference on Advances in Cryptology \u2013 CRYPTO\u201909, Lecture Notes in Computer Science, pages 391\u2013407. Springer, 2009.","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"7_CR141","doi-asserted-by":"crossref","unstructured":"Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, and Matthew Thompson. Relay cost bounding for contactless EMV payments. In Rainer B\u00f6hme and Tatsuaki Okamoto, editors, Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26\u201330, 2015, Revised Selected Papers, volume 8975 of Lecture Notes in Computer Science, pages 189\u2013206, Puerto Rico, January 2015. Springer.","DOI":"10.1007\/978-3-662-47854-7_11"},{"key":"7_CR149","doi-asserted-by":"crossref","unstructured":"Jolyon Clulow, Gerhard P Hancke, Markus G Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In European Workshop on Security in Ad-hoc and Sensor Networks, volume 4357 of Lecture Notes in Computer Science, pages 83\u201397. Springer, 2006.","DOI":"10.1007\/11964254_9"},{"key":"7_CR160","doi-asserted-by":"crossref","unstructured":"Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, and Srdjan Capkun. Distance hijacking attacks on distance bounding protocols. In IEEE Symposium on Security and Privacy, SP \u201912, pages 113\u2013127, Washington, DC, USA, 2012. IEEE.","DOI":"10.1109\/SP.2012.17"},{"key":"7_CR168","doi-asserted-by":"crossref","unstructured":"Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. Attacks on physical-layer identification. In ACM Conference on Wireless Network Security, WiSec \u201910, pages 89\u201398, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1741866.1741882"},{"key":"7_CR177","volume-title":"Proving physical proximity using symbolic models","author":"Alexandre Debant","year":"2018","unstructured":"Alexandre Debant, St\u00e9phanie Delaune, and Cyrille Wiedling. Proving physical proximity using symbolic models. Technical report, Univ Rennes, CNRS, IRISA, France, February 2018."},{"key":"7_CR178","unstructured":"Yvo Desmedt. Major security problems with the \u201cunforgeable\u201d (feige-)fiat-shamir proof of identity and how to overcome them. In Securicom 88, 6th worldwide congress on computer and communications security and protection, pages 147\u2013159. SEDEP Paris France, 1988."},{"key":"7_CR189","unstructured":"Saar Drimer and Steven J. Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In USENIX security symposium, volume 312, 2007."},{"key":"7_CR193","doi-asserted-by":"crossref","unstructured":"Ulrich D\u00fcrholz, Marc Fischlin, Michael Kasper, and Cristina Onete. A formal approach to distance bounding RFID protocols. In Information Security Conference ISC 2011, volume 7001 of Lecture Notes in Computer Science, pages 47\u201362. Springer, 2011.","DOI":"10.1007\/978-3-642-24861-0_4"},{"key":"7_CR199","unstructured":"EMVCo. Book C-2 kernel 2 specification v2.5. EMV contactless specifications for payment system, March 2015."},{"key":"7_CR216","doi-asserted-by":"crossref","unstructured":"Marc Fischlin and Cristina Onete. Terrorism in distance bounding: Modeling terrorist-fraud resistance. In Applied Cryptography and Network Security, ACNS\u201913, pages 414\u2013431. Springer, 2013.","DOI":"10.1007\/978-3-642-38980-1_26"},{"key":"7_CR221","unstructured":"Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In Network and Distributed System Security Symposium (NDSS). Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, Department of Computer Science, 2011."},{"key":"7_CR222","doi-asserted-by":"crossref","unstructured":"Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. Practical NFC peer-to-peer relay attack using mobile phones. In International Workshop on Radio Frequency Identification: Security and Privacy Issues, pages 35\u201349. Springer, 2010.","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"7_CR242","unstructured":"Xavier Torrent Gorj\u00f3n. Protecting against relay attacks forging increased distance reports. Research Project, Universiteit van Amsterdam, 2015."},{"key":"7_CR254","unstructured":"Gerhard P. Hancke and Markus G. Kuhn. An RFID distance bounding protocol. In Conference on Security and Privacy for Emergency Areas in Communication Networks (SecureComm) 2005, pages 67\u201373. IEEE, 2005."},{"key":"7_CR255","doi-asserted-by":"crossref","unstructured":"Gerhard P Hancke and Markus G Kuhn. Attacks on time-of-flight distance bounding channels. In ACM conference on Wireless network security, pages 194\u2013202. ACM, 2008.","DOI":"10.1145\/1352533.1352566"},{"key":"7_CR256","unstructured":"Gerhard P Hancke, KE Mayes, and Konstantinos Markantonakis. Confidence in smart token proximity: Relay attacks revisited. Computers & Security, 28(7):615\u2013627, 2009."},{"key":"7_CR303","unstructured":"Pieter Janssens. Proximity check for communication devices, April 2015."},{"key":"7_CR325","doi-asserted-by":"crossref","unstructured":"Handan Kilin\u00e7 and Serge Vaudenay. Optimal proximity proofs revisited. In Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, and Michalis Polychronakis, editors, ACNS 15: 13th International Conference on Applied Cryptography and Network Security, volume 9092 of Lecture Notes in Computer Science, pages 478\u2013494, New York, NY, USA, June 2\u20135, 2015. Springer.","DOI":"10.1007\/978-3-319-28166-7_23"},{"key":"7_CR326","doi-asserted-by":"crossref","unstructured":"Handan K\u0131l\u0131n\u00e7 and Serge Vaudenay. Formal analysis of distance bounding with secure hardware. Cryptology ePrint Archive, Report 2018\/440, 2018.","DOI":"10.1007\/978-3-319-93387-0_30"},{"key":"7_CR328","doi-asserted-by":"crossref","unstructured":"Chong Hee Kim, Gildas Avoine, Fran\u00e7ois Koeune, Fran\u00e7ois-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID distance bounding protocol. In Information Security and Cryptology (ICISC) 2008, volume 5461 of Lecture Notes in Computer Science, pages 98\u2013115. Springer, 2008.","DOI":"10.1007\/978-3-642-00730-9_7"},{"key":"7_CR347","unstructured":"J. Krumm and E. Horvitz. Locadio: inferring motion and location from wi-fi signal strengths. In The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., pages 4\u201313, August 2004."},{"key":"7_CR392","first-page":"21","volume":"12","author":"Konstantinos Markantonakis","year":"2012","unstructured":"Konstantinos Markantonakis, Lishoy Francis, Gerhard Hancke, and Keith Mayes. Practical relay attack on contactless transactions by using nfc mobile phones. Radio Frequency Identification System Security: RFIDsec, 12:21, 2012.","journal-title":"Radio Frequency Identification System Security: RFIDsec"},{"key":"7_CR401","doi-asserted-by":"crossref","unstructured":"S. Mauw, Z. Smith, J. Toro-Pozo, and R. Trujillo-Rasua. Distance-bounding protocols: Verification without time and location. In IEEE Symposium on Security and Privacy, volume 00, pages 152\u2013169, 2018.","DOI":"10.1109\/SP.2018.00001"},{"key":"7_CR406","doi-asserted-by":"crossref","unstructured":"Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin. The tamarin prover for the symbolic analysis of security protocols. In International Conference on Computer Aided Verification, CAV\u201913, pages 696\u2013701. Springer, 2013.","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"7_CR445","unstructured":"NXP. Nxp mifare plus ev1 \u2013 latest features on highest security level scalable \u2013 flexible \u2013 future proof, April 2016."},{"key":"7_CR446","unstructured":"NXP. Nxp mifare desfire ev2 \u2013 contactless IC for next-generation, multi-application solutions in smart cities, May 2018."},{"key":"7_CR496","doi-asserted-by":"crossref","unstructured":"Kasper Bonne Rasmussen and Srdjan \u010capkun. Location privacy of distance bounding protocols. In Conference on Computer and Communications Security (CCS), pages 149\u2013160. ACM, 2008.","DOI":"10.1145\/1455770.1455791"},{"key":"7_CR505","doi-asserted-by":"crossref","unstructured":"Michael Roland, Josef Langer, and Josef Scharinger. Applying relay attacks to google wallet. In Near Field Communication (NFC), 2013 5th International Workshop on, pages 1\u20136. IEEE, 2013.","DOI":"10.1109\/NFC.2013.6482441"},{"key":"7_CR531","doi-asserted-by":"crossref","unstructured":"Mridula Singh, Patrick Leu, and Srdjan Capkun. UWB with pulse reordering: Securing ranging against relay and physical layer attacks. IACR ePrint Report 2017\/1240, December 2017.","DOI":"10.29007\/8v3t"},{"key":"7_CR539","doi-asserted-by":"crossref","unstructured":"Luigi Sportiello and Andrea Ciardulli. Long distance relay attack. In International Workshop on Radio Frequency Identification: Security and Privacy Issues, pages 69\u201385. Springer, 2013.","DOI":"10.1007\/978-3-642-41332-2_5"},{"key":"7_CR548","doi-asserted-by":"crossref","unstructured":"Pierre-Henri Thevenon and Olivier Savry. Implementation of a countermeasure to relay attacks for contactless hf systems. In Radio Frequency Identification from System to Applications. InTech, 2013.","DOI":"10.5772\/53393"},{"key":"7_CR553","unstructured":"Peter Thueringer, Hans De Jong, Bruce Murray, Heike Neumann, Paul Hubmer, and Susanne Stern. Decoupling of measuring the response time of a transponder and its authentication, November 2008."},{"key":"7_CR561","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.dss.2013.10.003","volume":"59","author":"Pascal Urien","year":"2014","unstructured":"Pascal Urien and Selwyn Piramuthu. Elliptic curve-based rfid\/nfc authentication with temperature sensor input for relay attacks. Decis. Support Syst., 59:28\u201336, March 2014.","journal-title":"Decis. Support Syst."},{"key":"7_CR563","volume-title":"EMV in a nutshell","author":"Jordi van den Breekel","year":"2016","unstructured":"Jordi van den Breekel, Diego A. Ortiz-Yepes, Erik Poll, and Joeri de Ruiter. EMV in a nutshell. June, KPMG, IBM Research Zurich, Radboud University Nijmegen, 2016."},{"key":"7_CR567","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 Vila and Ricardo J. Rodr\u00edguez. Practical experiences on NFC relay attacks with android: Virtual pickpocketing revisited. In Stefan Mangard and Patrick Schaumont, editors, Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers, volume 9440 of Lecture Notes in Computer Science, pages 87\u2013103, New York City, USA, June 2015. Springer.","DOI":"10.1007\/978-3-319-24837-0_6"}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:41:39Z","timestamp":1697564499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_7","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}