Distance-bounding protocols

Attacks against card payment systems, door access-control readers and car thefts that involved relaying wireless signals helped to illustrate that, in some applications, authentication protocols not only need to confirm the identity of a communication partner, but also their proximity. Dedicated distance-bounding protocols perform authentication at the speed of light, to provide an upper bound on the distance to the other side. They pose tight latency requirements on communications channels and often require dedicated physical-layer support.

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*