{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:58:39Z","timestamp":1767034719796,"version":"3.37.3"},"reference-count":219,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"DFG through the CROSSING Project and the RTG 2050 \u201cPrivacy and Trust for Mobile User,\u201d"},{"name":"BMBF through the Smarter Project"},{"name":"LOEWE Initiative, Hessen, Germany, through the NICER Project"},{"name":"BMBF\/HMWK CRISP"},{"name":"DFG Mercator Fellowship Program"},{"name":"Shuttleworth Foundation"},{"DOI":"10.13039\/501100008756","name":"NLnet Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008756","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000996","name":"Australian Department of Foreign Affairs and Trade","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000996","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2017.2748278","type":"journal-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:22:39Z","timestamp":1504290159000},"page":"517-550","source":"Crossref","is-referenced-by-count":57,"title":["Survey and Systematization of Secure Device Pairing"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9697-0359","authenticated-orcid":false,"given":"Mikhail","family":"Fomichev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0584-6406","authenticated-orcid":false,"given":"Flor","family":"Alvarez","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Steinmetzer","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Gardner-Stephen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9163-5989","authenticated-orcid":false,"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130913"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.512"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183146"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2006.10.019"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2247758"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076780"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"ref32","first-page":"246","article-title":"BEDA: Button-enabled device pairing","volume":"2007","author":"soriente","year":"2007","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.01.090935"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.50"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837118"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-540-68914-0_20","article-title":"Efficient device pairing using &#x2018;human-comparable&#x2019; synchronized audiovisual patterns","author":"prasad","year":"2008","journal-title":"Proc Applied Cryptography and Network Security Conf (ACNS)"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2011","author":"schneier","key":"ref181"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025991"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813959"},{"key":"ref184","first-page":"131","article-title":"Hash visualization: A new technique to improve real-world security","author":"perrig","year":"1999","journal-title":"Proc Workshop Cryptographic Techniques and E-Commerce"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.003"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.09.002"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/CGAMES.2011.6000336"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_3"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2006.03.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493453"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2611575"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807521"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994556"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971688"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057210"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s13678-016-0007-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917865"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2014.6934398"},{"journal-title":"Nexus tech specs","year":"2016","key":"ref51"},{"key":"ref154","first-page":"7","article-title":"Bridging the air gap: Inaudible data exfiltration by insiders","author":"o\u2019malley","year":"2014","journal-title":"Proc 20th Americas Conf Inf Syst (AMCIS)"},{"journal-title":"MHz-Ultrasound in Air A Physical Miracle?","year":"2016","key":"ref153"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358053"},{"journal-title":"How Google Nearby (Really) Works&#x2014;And What Else It Does?","year":"2016","author":"legendre","key":"ref155"},{"journal-title":"Microphone Techniques for Recording","year":"2016","key":"ref150"},{"journal-title":"Ultrasonic Sound","year":"2016","key":"ref152"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.43"},{"key":"ref146","article-title":"On covert acoustical mesh networks in air","volume":"abs 1406 1213","author":"hanspach","year":"2014","journal-title":"CoRR"},{"key":"ref147","first-page":"187","article-title":"Various threat models to circumvent air-gapped systems for preventing network attack","author":"lee","year":"2015","journal-title":"Proc 11th Int Workshop Inf Secur Appl (WISA)"},{"key":"ref148","first-page":"3","article-title":"On acoustic covert channels between air-gapped systems","author":"carrara","year":"2014","journal-title":"Proc Int Symp Found Pract Secur"},{"journal-title":"Sound Propagation","year":"2016","key":"ref149"},{"key":"ref59","first-page":"1","article-title":"Secure in-band wireless pairing","author":"gollakota","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.11"},{"journal-title":"Wi-Fi Protected Setup Specification Version 1 0h","year":"2006","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5679551"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098253"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0340-4"},{"journal-title":"Run a Man-in-the-Middle Attack on a WiFi Hotspot","year":"2016","author":"fund","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26823-1_7"},{"key":"ref167","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/TDSC.2012.89","article-title":"Location-aware and safer cards: Enhancing RFID security and privacy via location sensing","volume":"10","author":"ma","year":"2013","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_17"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"journal-title":"Sensing Samsung The Evolution of Sensors in the Galaxy S Series","year":"2016","author":"fitchard","key":"ref164"},{"journal-title":"Understanding GPS Principles and Applications","year":"2005","author":"kaplan","key":"ref163"},{"journal-title":"Overview of Sensor","year":"2016","key":"ref162"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref6","first-page":"183","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"Proc Int Workshop Security Protocols"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"journal-title":"Bump","year":"2016","key":"ref159"},{"key":"ref7","article-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"balfanz","year":"2002","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2015.110.13"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1121\/1.397184"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439819197"},{"key":"ref158","first-page":"265","article-title":"Ripple: Communicating through physical vibration","author":"roy","year":"2015","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1007\/978-0-387-39940-9_192","article-title":"Human-computer interaction","author":"dix","year":"2009","journal-title":"Encyclopedia of Database Systems"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991094"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00633-8"},{"journal-title":"The ARRL antenna book the ultimate reference for amateur radio antennas","year":"2003","author":"straw","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"journal-title":"Doctors Disabled Wireless in Dick Cheney&#x2019;s Pacemaker to Thwart Hacking","year":"2017","key":"ref44"},{"journal-title":"Simple Pairing Whitepaper","year":"2006","key":"ref43"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336990"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660128"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2801073.2801075"},{"journal-title":"Bluetooth Secure Simple Pairing Using NFC","year":"2016","key":"ref70"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523666"},{"journal-title":"How Does TV-B-Gone Work?","year":"2016","key":"ref77"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1002\/sec.1400","article-title":"Flashing displays: User-friendly solution for bootstrapping secure associations between multiple constrained wireless devices","volume":"9","author":"kova?evi?","year":"2016","journal-title":"Security Commun Netw"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2413791"},{"key":"ref78","article-title":"Contextual proximity detection in the face of context-manipulating adversaries","volume":"abs 1511 905","author":"shrestha","year":"2015","journal-title":"CoRR"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.3"},{"key":"ref62","first-page":"1","article-title":"Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild","author":"kasper","year":"2011","journal-title":"Proc 19th Int Conf Softw Telecommun Comput Netw (SoftCOM)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346844"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455831"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1201\/AUEWIRNETMOB"},{"key":"ref65","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_21"},{"key":"ref67","first-page":"108","article-title":"An automatic, time-based, secure pairing protocol for passive RFID","author":"amariucai","year":"2011","journal-title":"Proc Int Workshop Radio Freq Identification Security Privacy Issues (RFIDSec)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594376"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2428989"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_4"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047231"},{"key":"ref193","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"RSA CryptoBytes"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352569"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067177"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.5121\/ijmnct.2013.3405"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.20"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2721914.2721933"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851640"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579020"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837117"},{"journal-title":"Wi-Fi Peer-to-Peer","year":"2017","key":"ref92"},{"article-title":"The serval project: Practical wireless ad-hoc mobile telecommunications","year":"2011","author":"gardner-stephen","key":"ref91"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-78"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2000.853084"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700461"},{"journal-title":"5GHz IEEE 802 11a for Interference Avoidance","year":"2016","key":"ref97"},{"article-title":"An authentication protocol using ultrasonic ranging","year":"2006","author":"mayrhofer","key":"ref82"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_9"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939934"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767583"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370618"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997514"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2942416"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref87","article-title":"Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas","author":"cai","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524366"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-121"},{"journal-title":"Bluetooth Basics","year":"2016","key":"ref100"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500428"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427848"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.5"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096217"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_29"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0264-7"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_26"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"ref213","article-title":"Walk-unlock: Zero-interaction authentication protected with multi-modal gait biometrics","volume":"abs 1605 766","author":"shrestha","year":"2016","journal-title":"CoRR"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964922"},{"journal-title":"Wi-Fi Direct","year":"2016","key":"ref215"},{"journal-title":"Guarding and Growing Personal Data Value","year":"2016","author":"cooper","key":"ref216"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23199"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146518"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2495165"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163585"},{"year":"0","key":"ref125"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107447981"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.35"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476474"},{"journal-title":"Smartphone Concept Incorporates LiFi Sensor for Receiving Light-Based Data","year":"2016","author":"rigg","key":"ref130"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639135"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.61"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860012"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307645"},{"journal-title":"A Comprehensive Look at Smartphone Screen Size Statistics and Trends","year":"2016","author":"barredo","key":"ref136"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218664"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.112"},{"journal-title":"Global Shipments of Smartphones With a Screen Size of 5 Inches or Larger From 2012 to 2016 (in Million Units)","year":"2016","key":"ref137"},{"key":"ref139","article-title":"Visible light communication: Tutorial","volume":"802","author":"won","year":"2008","journal-title":"Proc IEEE Project (P)"},{"article-title":"Positioning with Bluetooth, IRDA and RFID","year":"2002","author":"hallberg","key":"ref140"},{"journal-title":"What is Infrared?","year":"2016","key":"ref141"},{"journal-title":"Hackaday TV-B-Gone Kit (v1 2)","year":"2016","key":"ref142"},{"journal-title":"Which Phones Let Me Control Any TV?","year":"2016","author":"burns","key":"ref143"},{"journal-title":"Personal\/Consumer Electronics Market Analysis By Product (Smartphones Tablets Desktops Laptops\/Notebooks Digital Cameras Hard Disk Drives E-Readers) and Segment Forecasts to 2020","year":"2016","key":"ref2"},{"journal-title":"Signals and Systems for Speech and Hearing","year":"2011","author":"rosen","key":"ref144"},{"journal-title":"The Business of Automation Betting on Robots","year":"2016","author":"anandan","key":"ref1"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.50"},{"journal-title":"HP Elite x2 1011 G2&#x2014;Connecting to the Wireless Dock","year":"2016","key":"ref109"},{"journal-title":"SiBEAM Captures World&#x2019;s First 60GHz Millimeter-Wave Smartphone Design Win in Letv&#x2019;s Flagship Smartphone Le Max","year":"2016","key":"ref108"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0942-z"},{"key":"ref106","article-title":"WiGig and IEEE 802.11ad&#x2014;For multi-gigabyte-per-second WPAN and WLAN","volume":"abs 1211 7356","author":"shankar n","year":"2012","journal-title":"CoRR"},{"journal-title":"Wi-Fi CERTIFIED WiGig","year":"2016","key":"ref105"},{"year":"0","key":"ref104"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1002\/9780470889886"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260813"},{"journal-title":"RFID Selection Guide","year":"2016","key":"ref111"},{"journal-title":"RFID for Energy & Utility Industries","year":"2009","author":"sen","key":"ref112"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1002\/9781118256107.ch63"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.111413.00196"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572547"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2597768"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0421-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979282"},{"journal-title":"How NFC Works","year":"2016","key":"ref118"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"journal-title":"How Is RFID Used in Real World Applications?","year":"2016","author":"thrasher","key":"ref117"},{"journal-title":"Wi-Fi Simple Configuration Technical Specification Version 2 0 5","year":"2016","key":"ref17"},{"journal-title":"Security Bluetooth Low Energy","year":"2016","key":"ref18"},{"key":"ref119","first-page":"21","article-title":"Practical relay attack on contactless transactions by using NFC mobile phones","volume":"8","author":"francis","year":"2012","journal-title":"Proc Radio Freq Identification Syst Security (RFIDsec)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"ref114","first-page":"1","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proc 16th USENIX Security Symp"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1002\/sec.404"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.56"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482441"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2774984"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27152-1_2"},{"key":"ref123","article-title":"When theory and reality collide: Demystifying the effectiveness of ambient sensing for NFC-based proximity detection by applying relay attack data","author":"gurulian","year":"2016","journal-title":"arXiv preprint arXiv 1605 00425"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8302422\/08023969.pdf?arnumber=8023969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:59Z","timestamp":1642004579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8023969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":219,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2748278","relation":{},"ISSN":["1553-877X"],"issn-type":[{"type":"electronic","value":"1553-877X"}],"subject":[],"published":{"date-parts":[[2018]]}}}