• Publications
  • Influence
CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus
TLDR
This paper investigates the problems associated with implementing a backward compatible message authentication Protocol, CANAuth, and presents a message authentication protocol that meets all of the requirements set forth and does not violate any constraint of the CAN bus.
Location verification using secure distance bounding protocols
TLDR
This paper explains how to modify the distance bounding protocol to make it resistant to a so-called "terrorist fraud attack" and discusses the properties of these protocols.
Distance Bounding in Noisy Environments
TLDR
An improved distance bounding protocol for noisy channels that offers a substantial reduction in the number of communication rounds compared to the Hancke and Kuhn protocol and uses binary codes to correct bit errors occurring during the fast bit exchanges.
Low-cost untraceable authentication protocols for RFID
TLDR
This paper addresses the risk of tracking attacks in RFID networks by repairing three revised EC-RAC protocols and presenting the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties.
Privacy-Preserving ECC-Based Grouping Proofs for RFID
TLDR
This paper proposes a narrowstrong privacy-preserving RFID grouping proof and demonstrates that it can easily be extended to use cases with more than two tags, without any additional cost for an RFID tag.
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them
TLDR
This paper fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters).
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
TLDR
This article proposes a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC) and presents a novel ECC hardware architecture designed for RFID.
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning
TLDR
This paper proposes and analyses a novel methodology to fingerprint LoRa devices, which is inspired by recent advances in supervised machine learning and zero-shot image classification, and shows that identical chipsets can be distinguished with 59% to 99% accuracy per symbol, whereas chipsets from different vendors can be fingerprinted with 99% to 100% accuracy.
The Wireless Application Protocol
TLDR
The security architecture of WAP and some important properties of the WTLS protocol are described and some countermeasures and good practices when using WAP are proposed.
Security of Distance-Bounding
TLDR
This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
...
1
2
3
4
5
...