{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:07:01Z","timestamp":1729667221525,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/wmnc.2013.6549053","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T10:59:11Z","timestamp":1373367551000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Detecting relay attacks in RFID systems using physical layer characteristics"],"prefix":"10.1109","author":[{"given":"S. Tmar-Ben","family":"Hamida","sequence":"first","affiliation":[]},{"given":"P.-H","family":"Thevenon","sequence":"additional","affiliation":[]},{"given":"J.-B","family":"Pierrot","sequence":"additional","affiliation":[]},{"given":"O.","family":"Savry","sequence":"additional","affiliation":[]},{"given":"C.","family":"Castelluccia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.018"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/6.715187"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","article-title":"RFID distance bounding protocol with mixed challenges to prevent relay attacks","author":"kim","year":"2009","journal-title":"CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.590"},{"key":"13","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1229285.1229314","article-title":"Detecting relay attacks with timing based protocols","author":"reid","year":"2007","journal-title":"Proceedings of the 2nd Acm Symposium on Information Computer and Communication Security (ASIACCS)"},{"key":"14","first-page":"15","article-title":"Distance bounding protocols with void-challenges for RFIDs","author":"munilla","year":"2006","journal-title":"Proceedings of Workshop on RFID Security (RFIDsec)"},{"key":"11","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/0-387-25660-1_15","article-title":"Distance-Bounding proof of knowledge to avoid Real-Time attacks","author":"bussard","year":"2005","journal-title":"Security and Privacy in the Age of Ubiquitous Computing"},{"key":"12","first-page":"1","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-008-0158-5"},{"key":"20","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1109\/TMC.2007.70782","article-title":"Secure location verification with hidden and mobile base stations","volume":"7","author":"apkun","year":"2007","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"22","article-title":"Using directional antennas to prevent wormhole attacks","author":"hu","year":"2004","journal-title":"The Proceedings of Network and Distributed System Security Symposium (NDSS)"},{"journal-title":"The off Switch for Always on Mobile Wireless Devices","year":"0","key":"23"},{"journal-title":"Difrwear's RFID Blocking Products","year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102205"},{"journal-title":"Kendall's Advanced Theory of Statistics","year":"1987","author":"kendall","key":"26"},{"key":"27","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillion","year":"2010","journal-title":"Cryptology ePrint Archive Report"},{"key":"3","first-page":"344","article-title":"Distance-bounding protocols (extended abstract)","author":"brands","year":"1993","journal-title":"Eurocrypt"},{"key":"2","article-title":"Realization of RF Distance Bounding","author":"rasmussen","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"10","first-page":"250","article-title":"An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement","author":"avoine","year":"2009","journal-title":"ISC '09 Proceedings of the 12th International Con-ference on Information Security"},{"key":"1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/WPNC.2010.5653801","article-title":"UWB impulse radio based distance bounding","author":"kuhn","year":"2010","journal-title":"7th Workshop on Positioning Navigation and Communication WPNC 2010"},{"key":"7","article-title":"RFID distance bounding protocols","author":"tu","year":"2007","journal-title":"Pro-ceedings of 1st International EURASIP Workshop on RFID Technology"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"5","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","article-title":"Distance bounding in noisy environments","volume":"4572","author":"singelee","year":"2007","journal-title":"European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS) Springer-Verlag LNCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"8","first-page":"98","author":"kim","year":"2009","journal-title":"The Swiss-Knife RFID Distance Bounding Protocol"}],"event":{"name":"2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013)","start":{"date-parts":[[2013,4,23]]},"location":"Dubai","end":{"date-parts":[[2013,4,25]]}},"container-title":["6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6533891\/6548948\/06549053.pdf?arnumber=6549053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:19:52Z","timestamp":1602670792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6549053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2013.6549053","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}