{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:21Z","timestamp":1775745321057,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft","award":["EXC 2092 CaSa - 390781972"],"award-info":[{"award-number":["EXC 2092 CaSa - 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528536","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"60-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging"],"prefix":"10.1145","author":[{"given":"Paul","family":"Staat","sequence":"first","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]},{"given":"Kai","family":"Jansen","sequence":"additional","affiliation":[{"name":"PHYSEC GmbH, Bochum, Germany"}]},{"given":"Christian","family":"Zenger","sequence":"additional","affiliation":[{"name":"PHYSEC GmbH, Bochum, Germany"}]},{"given":"Harald","family":"Elders-Boll","sequence":"additional","affiliation":[{"name":"Technische Hochschule K\u00f6ln, Cologne, Germany"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.106-135"},{"key":"e_1_3_2_1_2_1","volume-title":"Alps Alpine and Broadcom Collaborate on a Secure Distance Measurement Solution based on Bluetooth\u00ae Technology. https:\/\/www.alpsalpine.com\/e\/news_release\/2021\/0105_02.html (accessed","author":"Alpine Alps","year":"2022","unstructured":"Alps Alpine . 2021. Alps Alpine and Broadcom Collaborate on a Secure Distance Measurement Solution based on Bluetooth\u00ae Technology. https:\/\/www.alpsalpine.com\/e\/news_release\/2021\/0105_02.html (accessed : February 04, 2022 ). Alps Alpine. 2021. Alps Alpine and Broadcom Collaborate on a Secure Distance Measurement Solution based on Bluetooth\u00ae Technology. https:\/\/www.alpsalpine.com\/e\/news_release\/2021\/0105_02.html (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_3_1","volume-title":"BIAS: Bluetooth Impersonation AttackS. In 2020 IEEE Symposium on Security and Privacy (SP). 549--562","author":"Antonioli Daniele","year":"2020","unstructured":"Daniele Antonioli , Nils Ole Tippenhauer , and Kasper Rasmussen . 2020 . BIAS: Bluetooth Impersonation AttackS. In 2020 IEEE Symposium on Security and Privacy (SP). 549--562 . https:\/\/doi.org\/10.1109\/SP40000.2020.00093 10.1109\/SP40000.2020.00093 Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. BIAS: Bluetooth Impersonation AttackS. In 2020 IEEE Symposium on Security and Privacy (SP). 549--562. https:\/\/doi.org\/10.1109\/SP40000.2020.00093"},{"key":"e_1_3_2_1_4_1","volume-title":"Antenna Theory: Analysis and Design","author":"Balanis Constantine A.","year":"2005","unstructured":"Constantine A. Balanis . 2005 . Antenna Theory: Analysis and Design 3 rd ed.). John Wiley & Sons , Hoboken, NJ, USA . Constantine A. Balanis. 2005. Antenna Theory: Analysis and Design 3rd ed.). John Wiley & Sons, Hoboken, NJ, USA.","edition":"3"},{"key":"e_1_3_2_1_5_1","volume-title":"Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. In 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE","author":"Baumg\u00e4rtner Lars","year":"2020","unstructured":"Lars Baumg\u00e4rtner , Alexandra Dmitrienko , Bernd Freisleben , Alexander Gruler , Jonas H\u00f6chst , Joshua K\u00fchlberg , Mira Mezini , Richard Mitev , Markus Miettinen , Anel Muhamedagic , Thien Duc Nguyen , Alvar Penning , Frederik Pustelnik , Filipp Roos , Ahmad-Reza Sadeghi , Michael Schwarz , and Christian Uhl . 2020 . Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. In 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE , Guangzhou, China, 458--467. Lars Baumg\u00e4rtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas H\u00f6chst, Joshua K\u00fchlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, and Christian Uhl. 2020. Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. In 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, Guangzhou, China, 458--467."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC19947.2020.9063073"},{"key":"e_1_3_2_1_7_1","volume-title":"Wireless Positioning Technologies and Applications","author":"Bensky Alan","unstructured":"Alan Bensky . 2016. Wireless Positioning Technologies and Applications 2 nd ed.). Artech House , Norwood, MA, USA . Alan Bensky. 2016. Wireless Positioning Technologies and Applications 2nd ed.). Artech House, Norwood, MA, USA.","edition":"2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626327"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486033"},{"key":"e_1_3_2_1_10_1","volume-title":"2015Keeping Your Car Safe From Electronic Thieves. The New York Times. https:\/\/www.nytimes.com\/2015\/04\/16\/style\/keeping-your-car-safe-from-electronic-thieves.html (accessed","author":"Bilton Nick","year":"2022","unstructured":"Nick Bilton . 2015Keeping Your Car Safe From Electronic Thieves. The New York Times. https:\/\/www.nytimes.com\/2015\/04\/16\/style\/keeping-your-car-safe-from-electronic-thieves.html (accessed : February 04, 2022 ). Nick Bilton. 2015Keeping Your Car Safe From Electronic Thieves. The New York Times. https:\/\/www.nytimes.com\/2015\/04\/16\/style\/keeping-your-car-safe-from-electronic-thieves.html (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_11_1","volume-title":"Denso Technology Aims to Swap Out Fobs for Phones. WardsAuto. https:\/\/www.wardsauto.com\/vehicles\/denso-technology-aims-swap-out-fobs-phones (accessed","year":"2022","unstructured":"Blanco, Sebastian. 2020. Denso Technology Aims to Swap Out Fobs for Phones. WardsAuto. https:\/\/www.wardsauto.com\/vehicles\/denso-technology-aims-swap-out-fobs-phones (accessed : February 04, 2022 ). Blanco, Sebastian. 2020. Denso Technology Aims to Swap Out Fobs for Phones. WardsAuto. https:\/\/www.wardsauto.com\/vehicles\/denso-technology-aims-swap-out-fobs-phones (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_12_1","volume-title":"2021 a. Bluetooth Core Specification Revision v5.3. https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=521059 (accessed","author":"Bluetooth","year":"2022","unstructured":"Bluetooth SIG. 2021 a. Bluetooth Core Specification Revision v5.3. https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=521059 (accessed : February 04, 2022 ). Bluetooth SIG. 2021 a. Bluetooth Core Specification Revision v5.3. https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=521059 (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_13_1","unstructured":"Bluetooth SIG. 2021 b. High Accuracy Distance Measurement (HADM) Demo For Keyless Entry Systems. https:\/\/www.bluetooth.com\/bluetooth-resources\/high-accuracy-distance-measurement-hadm-demo-for-keyless-entry-systems\/ (accessed: February 04 2022).  Bluetooth SIG. 2021 b. High Accuracy Distance Measurement (HADM) Demo For Keyless Entry Systems. https:\/\/www.bluetooth.com\/bluetooth-resources\/high-accuracy-distance-measurement-hadm-demo-for-keyless-entry-systems\/ (accessed: February 04 2022)."},{"key":"e_1_3_2_1_14_1","volume-title":"2021 c. Specifications in Development. https:\/\/www.bluetooth.com\/specifications\/in-development\/ (accessed","author":"Bluetooth","year":"2022","unstructured":"Bluetooth SIG. 2021 c. Specifications in Development. https:\/\/www.bluetooth.com\/specifications\/in-development\/ (accessed : February 04, 2022 ). Bluetooth SIG. 2021 c. Specifications in Development. https:\/\/www.bluetooth.com\/specifications\/in-development\/ (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4407221"},{"key":"e_1_3_2_1_16_1","volume-title":"Distance-Bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '93)","author":"Brands Stefan","year":"1993","unstructured":"Stefan Brands and David Chaum . 1993 . Distance-Bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '93) . Springer, Lofthus, Norway, 344--359. Stefan Brands and David Chaum. 1993. Distance-Bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '93). Springer, Lofthus, Norway, 344--359."},{"key":"e_1_3_2_1_17_1","unstructured":"Damien Cauquil. 2019. Defeating Bluetooth Low Energy 5 PRNG for fun and jamming. DEF CON 27. https:\/\/media.defcon.org\/DEF%20CON%2027\/DEF%20CON%2027%20presentations\/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF (accessed: February 04 2022).  Damien Cauquil. 2019. Defeating Bluetooth Low Energy 5 PRNG for fun and jamming. DEF CON 27. https:\/\/media.defcon.org\/DEF%20CON%2027\/DEF%20CON%2027%20presentations\/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF (accessed: February 04 2022)."},{"key":"e_1_3_2_1_18_1","volume-title":"Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. In 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP)","author":"Classen J.","year":"2022","unstructured":"J. Classen , F. Gringoli , M. Hermann , and M. Hollick . 2022 . Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. In 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP) . IEEE Computer Society , Los Alamitos, CA, USA , 808--824. https:\/\/doi.org\/10.1109\/SP46214.2022.00047 10.1109\/SP46214.2022.00047 J. Classen, F. Gringoli, M. Hermann, and M. Hollick. 2022. Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. In 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP). IEEE Computer Society, Los Alamitos, CA, USA, 808--824. https:\/\/doi.org\/10.1109\/SP46214.2022.00047"},{"key":"e_1_3_2_1_19_1","volume-title":"So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. In European Workshop on Security in Ad-hoc and Sensor Networks (ESAS '06)","author":"Clulow Jolyon","year":"2006","unstructured":"Jolyon Clulow , Gerhard P. Hancke , Markus G. Kuhn , and Tyler Moore . 2006 . So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. In European Workshop on Security in Ad-hoc and Sensor Networks (ESAS '06) . Springer, Hamburg, Germany, 83--97. Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. 2006. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. In European Workshop on Security in Ad-hoc and Sensor Networks (ESAS '06). Springer, Hamburg, Germany, 83--97."},{"key":"e_1_3_2_1_20_1","volume-title":"Google Play services. https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/DetectedActivity (accessed","author":"Developers Google","year":"2022","unstructured":"Google Developers . 2021. Google Play services. https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/DetectedActivity (accessed : February 04, 2022 ). Google Developers. 2021. Google Play services. https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/DetectedActivity (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/www.dialog-semiconductor.com\/sites\/default\/files\/smartbond_wireless_ranging_sdk_product_brief_hr.pdf (accessed","author":"Semiconductor Dialog","year":"2022","unstructured":"Dialog Semiconductor . 2019. SmartBond? Wireless Ranging SDK. https:\/\/www.dialog-semiconductor.com\/sites\/default\/files\/smartbond_wireless_ranging_sdk_product_brief_hr.pdf (accessed : February 04, 2022 ). Dialog Semiconductor. 2019. SmartBond? Wireless Ranging SDK. https:\/\/www.dialog-semiconductor.com\/sites\/default\/files\/smartbond_wireless_ranging_sdk_product_brief_hr.pdf (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_22_1","volume-title":"GPS-SDR-SIM Software-Defined GPS Signal Simulator. https:\/\/github.com\/osqzss\/gps-sdr-sim (accessed","author":"Ebinuma Takuji","year":"2022","unstructured":"Takuji Ebinuma . 2018. GPS-SDR-SIM Software-Defined GPS Signal Simulator. https:\/\/github.com\/osqzss\/gps-sdr-sim (accessed : March 28, 2022 ). Takuji Ebinuma. 2018. GPS-SDR-SIM Software-Defined GPS Signal Simulator. https:\/\/github.com\/osqzss\/gps-sdr-sim (accessed: March 28, 2022)."},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","volume-title":"Manzuri Shalmani","author":"Eisenbarth Thomas","year":"2008","unstructured":"Thomas Eisenbarth , Timo Kasper , Amir Moradi , Christof Paar , Mahmoud Salmasizadeh , and Mohammad T . Manzuri Shalmani . 2008 . On the Power of Power Analysis in the Real World : A Complete Break of the KeeLoq Code Hopping Scheme. In In CRYPTO 2008, volume 5157 of LNCS . Springer , Santa Barbara, California, USA, 203--220. Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani. 2008. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In In CRYPTO 2008, volume 5157 of LNCS. Springer, Santa Barbara, California, USA, 203--220."},{"key":"e_1_3_2_1_24_1","volume-title":"A BLE Based Secure Passive Keyless Entry Solution for Cars. https:\/\/www.everythingrf.com\/news\/details\/7210-A-BLE-Based-Secure-Passive-Keyless-Entry-Solution-for-Cars (accessed","author":"RF.","year":"2022","unstructured":"everything RF. 2018. A BLE Based Secure Passive Keyless Entry Solution for Cars. https:\/\/www.everythingrf.com\/news\/details\/7210-A-BLE-Based-Secure-Passive-Keyless-Entry-Solution-for-Cars (accessed : February 04, 2022 ). everythingRF. 2018. A BLE Based Secure Passive Keyless Entry Solution for Cars. https:\/\/www.everythingrf.com\/news\/details\/7210-A-BLE-Based-Secure-Passive-Keyless-Entry-Solution-for-Cars (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741887"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Francillon Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Francillon , Boris Danev , and Srdjan Capkun . 2011 . Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society , San Diego, CA, USA. Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_27_1","volume-title":"An Experimental Evaluation. In 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC) (Prague). IEEE, 1--8.","author":"Giovanelli Davide","year":"2018","unstructured":"Davide Giovanelli and Elisabetta Farella . 2018 . RSSI or Time-of-Flight for Bluetooth Low Energy Based Localization? An Experimental Evaluation. In 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC) (Prague). IEEE, 1--8. Davide Giovanelli and Elisabetta Farella. 2018. RSSI or Time-of-Flight for Bluetooth Low Energy Based Localization? An Experimental Evaluation. In 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC) (Prague). IEEE, 1--8."},{"key":"e_1_3_2_1_28_1","volume-title":"Wireless Communications","author":"Goldsmith Andrea","unstructured":"Andrea Goldsmith . 2005. Wireless Communications . Cambridge University Press , USA. Andrea Goldsmith. 2005. Wireless Communications. Cambridge University Press, USA."},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/greatscottgadgets.com\/hackrf\/one\/ (accessed","author":"Gadgets Great Scott","year":"2022","unstructured":"Great Scott Gadgets . 2021. Hack RF One . https:\/\/greatscottgadgets.com\/hackrf\/one\/ (accessed : March 28, 2022 ). Great Scott Gadgets. 2021. HackRF One. https:\/\/greatscottgadgets.com\/hackrf\/one\/ (accessed: March 28, 2022)."},{"key":"e_1_3_2_1_30_1","volume-title":"Radio Attack Lets Hackers Steal 24 Different Car Models. Wired. https:\/\/www.wired.com\/2016\/03\/study-finds-24-car-models-open-unlocking-ignition-hack\/ (accessed","author":"Greenberg Andy","year":"2022","unstructured":"Andy Greenberg . 2016. Radio Attack Lets Hackers Steal 24 Different Car Models. Wired. https:\/\/www.wired.com\/2016\/03\/study-finds-24-car-models-open-unlocking-ignition-hack\/ (accessed : February 04, 2022 ). Andy Greenberg. 2016. Radio Attack Lets Hackers Steal 24 Different Car Models. Wired. https:\/\/www.wired.com\/2016\/03\/study-finds-24-car-models-open-unlocking-ignition-hack\/ (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_1_33_1","volume-title":"Next-Gen high-accuracy fast ranging Bluetooth 5.1 0.8V ULP radio in TSMC 40nm. https:\/\/www.imec-int.com\/sites\/default\/files\/2021-03\/NEXT-GEN%20HIGH-ACCURACY%20FAST%20RANGING.pdf (accessed","year":"2022","unstructured":"imec. [n.,d.]. Next-Gen high-accuracy fast ranging Bluetooth 5.1 0.8V ULP radio in TSMC 40nm. https:\/\/www.imec-int.com\/sites\/default\/files\/2021-03\/NEXT-GEN%20HIGH-ACCURACY%20FAST%20RANGING.pdf (accessed : February 05, 2022 ). imec. [n.,d.]. Next-Gen high-accuracy fast ranging Bluetooth 5.1 0.8V ULP radio in TSMC 40nm. https:\/\/www.imec-int.com\/sites\/default\/files\/2021-03\/NEXT-GEN%20HIGH-ACCURACY%20FAST%20RANGING.pdf (accessed: February 05, 2022)."},{"key":"e_1_3_2_1_34_1","volume-title":"Secure High Accuracy Ranging on Bluetooth. https:\/\/www.imec-int.com\/drupal\/sites\/default\/files\/2020-02\/Secure-Prox-V02.pdf (accessed","year":"2022","unstructured":"imec. [n.,d.]. Secure High Accuracy Ranging on Bluetooth. https:\/\/www.imec-int.com\/drupal\/sites\/default\/files\/2020-02\/Secure-Prox-V02.pdf (accessed : February 04, 2022 ). imec. [n.,d.]. Secure High Accuracy Ranging on Bluetooth. https:\/\/www.imec-int.com\/drupal\/sites\/default\/files\/2020-02\/Secure-Prox-V02.pdf (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_35_1","volume-title":"2012 IEEE International Conference on Communications (ICC). IEEE","author":"Jain Shalabh","unstructured":"Shalabh Jain , Tuan Ta , and John S. Baras . 2012. Wormhole detection using channel characteristics . In 2012 IEEE International Conference on Communications (ICC). IEEE , Ottawa, Canada, 6699--6704. Shalabh Jain, Tuan Ta, and John S. Baras. 2012. Wormhole detection using channel characteristics. In 2012 IEEE International Conference on Communications (ICC). IEEE, Ottawa, Canada, 6699--6704."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23107"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666141.2666143"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Isolation Enhancement between Indoor Repeater Antennas with Chip Resistor Embedded FSS","volume":"2012","author":"Lee Jae-Yeong","year":"2012","unstructured":"Jae-Yeong Lee , Byeongkwan Kim , Myun joo Park , and Byungje Lee . 2012 . Isolation Enhancement between Indoor Repeater Antennas with Chip Resistor Embedded FSS . International Journal of Antennas and Propagation , Vol. 2012 (2012), 1 -- 7 . Jae-Yeong Lee, Byeongkwan Kim, Myun joo Park, and Byungje Lee. 2012. Isolation Enhancement between Indoor Repeater Antennas with Chip Resistor Embedded FSS. International Journal of Antennas and Propagation, Vol. 2012 (2012), 1--7.","journal-title":"International Journal of Antennas and Propagation"},{"key":"e_1_3_2_1_39_1","volume-title":"Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. In 2020 IEEE Symposium on Security and Privacy (SP). 500--516","author":"Leu P.","year":"2020","unstructured":"P. Leu , M. Singh , M. Roeschlin , K. G. Paterson , and S. \u010capkun . 2020 . Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. In 2020 IEEE Symposium on Security and Privacy (SP). 500--516 . P. Leu, M. Singh, M. Roeschlin, K. G. Paterson, and S. \u010capkun. 2020. Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. In 2020 IEEE Symposium on Security and Privacy (SP). 500--516."},{"key":"e_1_3_2_1_40_1","volume-title":"cC etin Kaya Kocc, and M. Ufuk \u00c7au\u011flayan","author":"Levi Albert","year":"2004","unstructured":"Albert Levi , Erhan \u00c7etintac\u015f , Murat Aydos , cC etin Kaya Kocc, and M. Ufuk \u00c7au\u011flayan . 2004 . Relay Attacks on Bluetooth Authentication and Solutions. In Lecture Notes in Computer Science. Springer Berlin Heidelberg , 278--288. Albert Levi, Erhan \u00c7etintac\u015f, Murat Aydos, cC etin Kaya Kocc, and M. Ufuk \u00c7au\u011flayan. 2004. Relay Attacks on Bluetooth Authentication and Solutions. In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 278--288."},{"key":"e_1_3_2_1_41_1","volume-title":"LT5538 - 40MHz to 3.8GHz RF Power Detector with 75dB Dynamic Range. https:\/\/www.analog.com\/media\/en\/technical-documentation\/data-sheets\/5538f.pdf (accessed","author":"Linear Technology Corporation","year":"2022","unstructured":"Linear Technology Corporation . 2008. LT5538 - 40MHz to 3.8GHz RF Power Detector with 75dB Dynamic Range. https:\/\/www.analog.com\/media\/en\/technical-documentation\/data-sheets\/5538f.pdf (accessed : February 04, 2022 ). Linear Technology Corporation. 2008. LT5538 - 40MHz to 3.8GHz RF Power Detector with 75dB Dynamic Range. https:\/\/www.analog.com\/media\/en\/technical-documentation\/data-sheets\/5538f.pdf (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_42_1","volume-title":"The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia) (Cryptology and Information Security Series","volume":"32","author":"Francis Lishoy","year":"2012","unstructured":"Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis . 2012 . Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones . In The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia) (Cryptology and Information Security Series , Vol. 8). IOS Press, 21-- 32 . Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis. 2012. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. In The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia) (Cryptology and Information Security Series, Vol. 8). IOS Press, 21--32."},{"key":"e_1_3_2_1_43_1","volume-title":"MAPS-010164: Digital Phase Shifter. https:\/\/cdn.macom.com\/datasheets\/MAPS-010164.pdf (accessed","author":"M\/A-COM Technology Solutions Inc. [n.,d.].","year":"2022","unstructured":"M\/A-COM Technology Solutions Inc. [n.,d.]. MAPS-010164: Digital Phase Shifter. https:\/\/cdn.macom.com\/datasheets\/MAPS-010164.pdf (accessed : February 04, 2022 ). M\/A-COM Technology Solutions Inc. [n.,d.]. MAPS-010164: Digital Phase Shifter. https:\/\/cdn.macom.com\/datasheets\/MAPS-010164.pdf (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_44_1","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES 2017 (Lecture Notes in Computer Science","author":"\u00d3lafsd\u00f3ttir Hildur","unstructured":"Hildur \u00d3lafsd\u00f3ttir , Aanjhan Ranganathan , and Srdjan Capkun . 2017. On the Security of Carrier Phase-Based Ranging . In Cryptographic Hardware and Embedded Systems -- CHES 2017 (Lecture Notes in Computer Science , Vol. 10529). Springer, Taipei, Taiwan, 490-- 509 . Hildur \u00d3lafsd\u00f3ttir, Aanjhan Ranganathan, and Srdjan Capkun. 2017. On the Security of Carrier Phase-Based Ranging. In Cryptographic Hardware and Embedded Systems -- CHES 2017 (Lecture Notes in Computer Science, Vol. 10529). Springer, Taipei, Taiwan, 490--509."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.56"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185453"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482441"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"e_1_3_2_1_50_1","volume-title":"UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Singh Mridula","year":"2019","unstructured":"Mridula Singh , Patrick Leu , AbdelRahman Abdou , and Srdjan Capkun . 2019 a . UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 73--88. Mridula Singh, Patrick Leu, AbdelRahman Abdou, and Srdjan Capkun. 2019 a. UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 73--88."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23109"},{"key":"e_1_3_2_1_52_1","volume-title":"GATTacking Bluetooth Smart Devices. SecuRing. https:\/\/github.com\/securing\/docs\/raw\/master\/whitepaper.pdf (accessed","year":"2022","unstructured":"S\u0142awomir, Jasek. [n.,d.]. GATTacking Bluetooth Smart Devices. SecuRing. https:\/\/github.com\/securing\/docs\/raw\/master\/whitepaper.pdf (accessed : February 04, 2022 ). S\u0142awomir, Jasek. [n.,d.]. GATTacking Bluetooth Smart Devices. SecuRing. https:\/\/github.com\/securing\/docs\/raw\/master\/whitepaper.pdf (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_53_1","volume-title":"Patent No. US20200219344A1, Filed March 19th.","author":"Stitt Raymond Michael","year":"2020","unstructured":"Raymond Michael Stitt . 2020 . Passive entry\/passive start systems implementing carrier phase based ranging with music style eigenvalue decomposition for distance determinations . Patent No. US20200219344A1, Filed March 19th. , 2020. Raymond Michael Stitt. 2020. Passive entry\/passive start systems implementing carrier phase based ranging with music style eigenvalue decomposition for distance determinations. Patent No. US20200219344A1, Filed March 19th., 2020."},{"key":"e_1_3_2_1_54_1","volume-title":"Bluetooth 5.2, and 802.15.4\/Thread for Seamless IoT Connectivity. https:\/\/www.synaptics.com\/company\/news\/synaptics-launches-industrys-first-matter-compliant-triple-combo (accessed","year":"2022","unstructured":"synaptics. [n.,d.]. Synaptics Launches Industry's First Matter-Compliant Triple Combo? SoC with Integrated Wi-Fi 6\/6E , Bluetooth 5.2, and 802.15.4\/Thread for Seamless IoT Connectivity. https:\/\/www.synaptics.com\/company\/news\/synaptics-launches-industrys-first-matter-compliant-triple-combo (accessed : February 05, 2022 ). synaptics. [n.,d.]. Synaptics Launches Industry's First Matter-Compliant Triple Combo? SoC with Integrated Wi-Fi 6\/6E, Bluetooth 5.2, and 802.15.4\/Thread for Seamless IoT Connectivity. https:\/\/www.synaptics.com\/company\/news\/synaptics-launches-industrys-first-matter-compliant-triple-combo (accessed: February 05, 2022)."},{"key":"e_1_3_2_1_55_1","unstructured":"Texas Instruments. 2019. SimpleLink? CC2640R2 SDK User's Guide for BLE-Stack 3.03.01.00 (RTLS Toolbox Time of Flight). http:\/\/software-dl.ti.com\/simplelink\/esd\/simplelink_cc2640r2_sdk\/3.30.00.20\/exports\/docs\/blestack\/ble_user_guide\/html\/ble-stack-3.x-guide\/localization-index.html (accessed: February 04 2022).  Texas Instruments. 2019. SimpleLink? CC2640R2 SDK User's Guide for BLE-Stack 3.03.01.00 (RTLS Toolbox Time of Flight). http:\/\/software-dl.ti.com\/simplelink\/esd\/simplelink_cc2640r2_sdk\/3.30.00.20\/exports\/docs\/blestack\/ble_user_guide\/html\/ble-stack-3.x-guide\/localization-index.html (accessed: February 04 2022)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_3_2_1_57_1","volume-title":"Smartphones Replace Fobs for Keyless Vehicle Entry","author":"Ulrich Lawrence","year":"2022","unstructured":"Lawrence Ulrich . 2019. Smartphones Replace Fobs for Keyless Vehicle Entry . IEEE Spectrum . https:\/\/spectrum.ieee.org\/cars-that-think\/transportation\/advanced-cars\/smartphones-replace-fobs-for-keyless-vehicle-entry (accessed: February 04, 2022 ). Lawrence Ulrich. 2019. Smartphones Replace Fobs for Keyless Vehicle Entry. IEEE Spectrum. https:\/\/spectrum.ieee.org\/cars-that-think\/transportation\/advanced-cars\/smartphones-replace-fobs-for-keyless-vehicle-entry (accessed: February 04, 2022)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.149-172"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.66-85"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2632427"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885791"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503773"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":61,"alternative-id":["10.1145\/3507657.3528536","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528536","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}