{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:18:24Z","timestamp":1775323104491,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642168215","type":"print"},{"value":"9783642168222","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_4","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"35-49","source":"Crossref","is-referenced-by-count":94,"title":["Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones"],"prefix":"10.1007","author":[{"given":"Lishoy","family":"Francis","sequence":"first","affiliation":[]},{"given":"Gerhard","family":"Hancke","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"ISO\/IEC 18092 (ECMA-340), Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol (NFCIP-1) (2004), http:\/\/www.iso.org\/ (cited March 31, 2010)"},{"key":"4_CR2","unstructured":"Bluetooth Core Specification Version 2.1. + EDR. Vol. 2 (July 2007)"},{"key":"4_CR3","unstructured":"Lin, G., Mikhak, A.A., Nakajima, L.T., Mayo, S.A., Rosenblatt, M.: Peer-to-peer Financial Transaction Devices and Methods. Apple Inc. Patent Application WO\/2010\/039337 (April 2010)"},{"issue":"7","key":"4_CR4","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.cose.2009.06.001","volume":"28","author":"G.P. Hancke","year":"2009","unstructured":"Hancke, G.P., Mayes, K.E., Markantonakis, K.: Confidence in Smart Token Proximity: Relay Attacks Revisited. Elsevier Computers & Security\u00a028(7), 615\u2013627 (2009)","journal-title":"Elsevier Computers & Security"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Anderson, R.: RFID and the Middleman. In: Conference on Financial Cryptography and Data Security, pp. 46\u201349 (December 2007)","DOI":"10.1007\/978-3-540-77366-5_6"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. In: Proceedings of IEEE\/CreateNet SecureComm, pp. 47\u201358 (2005)","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"4_CR7","unstructured":"Sun Microsystems, JSR-000118 Mobile Information Device Profile 2.0, http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr118\/index.html ."},{"key":"4_CR8","unstructured":"ISO\/IEC 21481 (ECMA-352), Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol (NFCIP-2) (2005), http:\/\/www.iso.org\/ (cited March 31, 2010)"},{"key":"4_CR9","unstructured":"ISO\/IEC 14443, Identification cards Contactless integrated circuit cards Proximity cards, http:\/\/www.iso.org\/ (cited March 31, 2010)"},{"key":"4_CR10","unstructured":"ISO\/IEC 15693, Identification cards \u2013 Contactless integrated circuit cards \u2013 Vicinity cards, http:\/\/www.iso.org\/ (cited March 31, 2010)"},{"key":"4_CR11","unstructured":"FeliCa, http:\/\/www.sony.net\/Products\/felica\/ (cited March 31, 2010)"},{"key":"4_CR12","unstructured":"European Technical Standards Institute (ETSI), Smart Cards; UICC-Terminal interface; Physical and logical characteristics (Release 7), TS 102 221 V7.9.0 (2007-07), http:\/\/www.etsi.org\/ (cited March 31,2010)"},{"key":"4_CR13","unstructured":"Third Generation Partnership Project, Specification of the Subscriber Identity Module-Mobile Equipment (SIM - ME) interface (Release 1999), TS 11.11 V8.14.0 (2007-06), http:\/\/www.3gpp.org\/"},{"key":"4_CR14","unstructured":"Third Generation Partnership Project, Characteristics of the Universal Subscriber Identity Module (USIM) application (Release 7), TS 31.102 V7.10.0 (2007-09), http:\/\/www.3gpp.org\/"},{"key":"4_CR15","unstructured":"Third Generation Partnership Project 2 (3GPP2), Removable User Identity Module (RUIM) for Spread Spectrum Systems, 3GPP2 C.S0023-C V1.0 (May 26, 2006), http:\/\/www.3gpp2.org\/"},{"key":"4_CR16","unstructured":"SD Card Association, http:\/\/www.sdcard.org\/ (cited March 31, 2010)"},{"key":"4_CR17","unstructured":"Candidate Technical Specification: Signature Record Type Definition. NFC Forum (October 2009)"},{"key":"4_CR18","unstructured":"Near Field Communication (NFC) Forum, http:\/\/www.nfc-forum.org (cited March 31, 2010)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Sun Microsystems, Java Card Platform Specification v2.2.1, http:\/\/java.sun.com\/products\/javacard\/specs.html (cited March 31, 2010)","DOI":"10.1109\/ICIECS.2010.5677726"},{"key":"4_CR20","unstructured":"NXP, Java Card Open Platform, http:\/\/www.nxp.com\/ (cited March 31, 2010)"},{"key":"4_CR21","unstructured":"Global Platform, Card Specification v2.1.1, http:\/\/www.globalplatform.org (cited March 31, 2010)"},{"key":"4_CR22","unstructured":"NXP Semiconductor: Mifare Standard Specification, http:\/\/www.nxp.com\/acrobat_download\/other\/identification\/ (cited March 31, 2010)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Francis, L., Hancke, G.P., Mayes, K.E., Markantonakis, K.: Potential Misuse of NFC Enabled Mobile Handsets with Embedded Security Elements as Contactless Attack Platforms. In: Proceedings of the 1st Workshop on RFID Security and Cryptography (RISC 2009), in conjunction with the International Conference for Internet Technology and Secured Transactions (ICITST 2009), , pp. 1\u20138 (November 2009)","DOI":"10.1109\/ICITST.2009.5402513"},{"key":"4_CR24","volume-title":"Smart Cards, Tokens, Security and Applications","year":"2008","unstructured":"Mayes, K.E., Markantonakis, K. (eds.): Smart Cards, Tokens, Security and Applications. Springer, Heidelberg (2008), ISBN: 978-0-387-72197-2"},{"key":"4_CR25","unstructured":"Sun Microsystems: JSR-000257 Contactless Communication API 1.0, http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr257\/index.html"},{"key":"4_CR26","volume-title":"On Numbers and Games","author":"J.H. Conway","year":"1976","unstructured":"Conway, J.H.: On Numbers and Games. Academic Press, London (1976)"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat-Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, p. 21. Springer, Heidelberg (1988)"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas in Communications (JSAC), 370\u2013380 (2006)","DOI":"10.1109\/JSAC.2005.861394"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proceedings of IEEE\/CreateNet SecureComm, pp. 67\u201373 (September 2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: Practical Attacks on Proximity Identification Systems. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 328\u2013333 (May 2006) (short paper)","DOI":"10.1109\/SP.2006.30"},{"key":"4_CR31","unstructured":"Libnfc.org, Public Platform Independent Near Field Communication (NFC) Library, http:\/\/www.libnfc.org\/documentation\/examples\/nfc-relay (cited March 31, 2010)"},{"key":"4_CR32","unstructured":"RFID IO Tools, rfidiot.org (cited March 31, 2010)"},{"key":"4_CR33","unstructured":"Sun Microsystems: JSR-000082 Java API for Bluetooth 2.1, http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr082\/index.html (cited March 31, 2010)"},{"key":"4_CR34","unstructured":"Sun Microsystems: Java Code Signing for J2ME, http:\/\/java.sun.com\/ (cited March 31, 2010)"},{"key":"4_CR35","unstructured":"Nokia Forum, Java Security Domains, http:\/\/wiki.forum.nokia.com\/index.php\/Java_Security_Domains (cited March 31, 2010)"},{"key":"4_CR36","unstructured":"Nokia Forum, MIDP 2.0 API Access Rights, http:\/\/wiki.forum.nokia.com\/index.php\/MIDP_2.0_API_access_rights (cited March 31, 2010)"},{"key":"4_CR37","unstructured":"Nokia Forum, MIDP 2.1 API Access Rights, http:\/\/wiki.forum.nokia.com\/index.php\/MIDP_2.1_API_access_rights (cited March 31, 2010)"},{"key":"4_CR38","unstructured":"Nokia Forum, Nokia 6131 API Access Rights, http:\/\/wiki.forum.nokia.com\/index.php\/API_access_rights_on_phones,_Series_40_3rd_FP1 (cited March 31, 2010)"},{"key":"4_CR39","unstructured":"Nokia Forum, Nokia 6212 API Access Rights, http:\/\/wiki.forum.nokia.com\/index.php\/API_access_rights_on_phones,_Series_40_5th_FP1 (cited March 31, 2010)"},{"key":"4_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance Bounding Protocols. Advances in Cryptology. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11964254_9","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"J. Clulow","year":"2006","unstructured":"Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.\u00a04357, pp. 83\u201397. Springer, Heidelberg (2006)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: Attacks on Time-of-Flight Distance Bounding Channels. In: Proceedings of the First ACM Conference on Wireless Network Security (WISEC 2008), pp. 194\u2013202 (March 2008)","DOI":"10.1145\/1352533.1352566"},{"key":"4_CR43","unstructured":"Rasmussen, K.B., \u010capkun, S.: Implications of Radio Fingerprinting on the Security of Sensor Networks. In: Proceedings of IEEE SecureComm. (2007)"},{"key":"4_CR44","unstructured":"Danev, B., Heydt-Benjamin, T.S., \u010capkun, S.: Physical-layer Identification of RFID Devices. In: Proceedings of USENIX Security Symposium (2009)"},{"key":"4_CR45","unstructured":"Anderson, R.J., Bond, M.: The Man-in-the-Middle Defense. Presented at Security Protocols Workshop (March 2006), http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/Man-in-the-Middle-Defence.pdf"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Stajano, F., Wong, F.L., Christianson, B.: Multichannel Protocols to Prevent Relay Attacks. In: Conference on Financial Cryptography and Data Security (January 2010)","DOI":"10.1007\/978-3-642-14577-3_4"},{"issue":"4","key":"4_CR47","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.2008.4481347","volume":"46","author":"A. Boukerche","year":"2008","unstructured":"Boukerche, A., Oliveira, H.A.B., Nakamura, E.F., Loureiro, A.A.F.: Secure Localization Algorithms for Wireless Sensor Networks. IEEE Communications Magazine\u00a046(4), 96\u2013101 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"4_CR48","unstructured":"Google Maps: Google Inc., http:\/\/www.googlemaps.com\/ (cited March 31, 2010)"},{"key":"4_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1514411.1514414","volume-title":"Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile 2009","author":"S. Saroiu","year":"2009","unstructured":"Saroiu, S., Wolman, A.: Enabling New Mobile Applications with Location Proofs. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile 2009, Santa Cruz, California, February 23 - 24, pp. 1\u20136. ACM, New York (2009)"},{"key":"4_CR50","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1734583.1734586","volume-title":"Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile 2010","author":"W. Luo","year":"2010","unstructured":"Luo, W., Hengartner, U.: Proving your Location without giving up your Privacy. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile 2010, Annapolis, Maryland, February 22 - 23, pp. 7\u201312. ACM, New York (2010)"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A Defense Against Wormhole Attacks in Wireless Networks. In: Proceedings of INFOCOM, pp. 1976\u20131986 (April 2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"4_CR52","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., Rasmussen, K.B., P\u00f6pper, C., Capkun, S.: Attacks on Public WLAN-based Positioning. In: Proceedings of the ACM\/Usenix International Conference on Mobile Systems, Applications and Services, MobiSys (2009)","DOI":"10.1145\/1555816.1555820"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T14:01:17Z","timestamp":1740664877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}