Distance Hijacking Attacks on Distance Bounding Protocols
After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are historically known as Distance Fraud, Mafia Fraud, and Ter...
Main Authors: | , , , |
---|---|
Format: | Conference item |
Published: |
2012
|