On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

A survey on context-based co-presence detection techniques

M Conti, C Lal - arXiv preprint arXiv:1808.03320, 2018 - arxiv.org
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments

C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …