{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:52Z","timestamp":1750219852252,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2128567, 2112471"],"award-info":[{"award-number":["2128567, 2112471"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3590193","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"353-363","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Malicious Relay Detection and Legitimate Channel Recovery"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4185-1735","authenticated-orcid":false,"given":"Xingya","family":"Zhao","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3738-4151","authenticated-orcid":false,"given":"Wei-Han","family":"Chen","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2805-1902","authenticated-orcid":false,"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155259"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345438"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00069"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626327"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_2_9_1","volume-title":"An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks. 565--570","author":"Demirbas Murat","year":"2006","unstructured":"Murat Demirbas and Youngwhan Song . 2006 . An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks. 565--570 . Murat Demirbas and Youngwhan Song. 2006. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks. 565--570."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"e_1_3_2_2_11_1","unstructured":"Saar Drimer Steven J Murdoch etal 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.. In USENIX security symposium Vol. 312.  Saar Drimer Steven J Murdoch et al. 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.. In USENIX security symposium Vol. 312."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS). Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, Department of Computer Science.","author":"Francillon Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Francillon , Boris Danev , and Srdjan Capkun . 2011 . Relay attacks on passive keyless entry and start systems in modern cars . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, Department of Computer Science. Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS). Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, Department of Computer Science."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462129"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_3_2_2_20_1","volume-title":"2012 Proceedings IEEE INFOCOM. IEEE, 927--935","author":"Liu Hongbo","year":"2012","unstructured":"Hongbo Liu , Jie Yang , Yan Wang , and Yingying Chen . 2012 . Collaborative secret key extraction leveraging received signal strength in mobile wireless networks . In 2012 Proceedings IEEE INFOCOM. IEEE, 927--935 . Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In 2012 Proceedings IEEE INFOCOM. IEEE, 927--935."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143396"},{"key":"e_1_3_2_2_25_1","unstructured":"Kasper Bonne Rasmussen and Srdjan Capkun. 2010. Realization of RF Distance Bounding.. In USENIX security symposium. 389--402.  Kasper Bonne Rasmussen and Srdjan Capkun. 2010. Realization of RF Distance Bounding.. In USENIX security symposium. 389--402."},{"key":"e_1_3_2_2_26_1","volume-title":"5th InternationalWorkshop on Near Field Communication (NFC). IEEE, 1--6.","author":"Roland Michael","year":"2013","unstructured":"Michael Roland , Josef Langer , and Josef Scharinger . 2013 . Applying relay attacks to GoogleWallet. In 2013 5th InternationalWorkshop on Near Field Communication (NFC). IEEE, 1--6. Michael Roland, Josef Langer, and Josef Scharinger. 2013. Applying relay attacks to GoogleWallet. In 2013 5th InternationalWorkshop on Near Field Communication (NFC). IEEE, 1--6."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"e_1_3_2_2_28_1","volume-title":"Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. arXiv preprint arXiv:2202.06554","author":"Staat Paul","year":"2022","unstructured":"Paul Staat , Kai Jansen , Christian Zenger , Harald Elders-Boll , and Christof Paar . 2022. Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. arXiv preprint arXiv:2202.06554 ( 2022 ). Paul Staat, Kai Jansen, Christian Zenger, Harald Elders-Boll, and Christof Paar. 2022. Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. arXiv preprint arXiv:2202.06554 (2022)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942361"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934895"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300133"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500444"}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Guildford United Kingdom","acronym":"WiSec '23"},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590193","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590193","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":34,"alternative-id":["10.1145\/3558482.3590193","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3590193","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}