{"id":"https://openalex.org/W2037025413","doi":"https://doi.org/10.1587/transinf.e95.d.1155","title":"Lightweight Distance Bounding Protocol against Relay Attacks","display_name":"Lightweight Distance Bounding Protocol against Relay Attacks","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2037025413","doi":"https://doi.org/10.1587/transinf.e95.d.1155","mag":"2037025413"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e95.d.1155","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E95.D/4/E95.D_4_1155/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E95.D/4/E95.D_4_1155/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100780621","display_name":"Jin Seok Kim","orcid":"https://orcid.org/0000-0001-8986-8436"},"institutions":[{"id":"https://openalex.org/I2799891827","display_name":"Korea Post","ror":"https://ror.org/00p45d091","country_code":"KR","type":"government","lineage":["https://openalex.org/I2799891827","https://openalex.org/I2801339556","https://openalex.org/I4387152098"]},{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jin Seok KIM","raw_affiliation_strings":["Department of Electrical Engineering, POSTECH"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, POSTECH","institution_ids":["https://openalex.org/I2799891827","https://openalex.org/I123900574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005813373","display_name":"Kookrae Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kookrae CHO","raw_affiliation_strings":["Division of IT-Convergence"],"affiliations":[{"raw_affiliation_string":"Division of IT-Convergence","institution_ids":["https://openalex.org/I4210147194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046277930","display_name":"Dae Hyun Yum","orcid":null},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dae Hyun YUM","raw_affiliation_strings":["Educational Institute of Future Information Technology, POSTECH"],"affiliations":[{"raw_affiliation_string":"Educational Institute of Future Information Technology, POSTECH","institution_ids":["https://openalex.org/I123900574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103538200","display_name":"Sung Je Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I2799891827","display_name":"Korea Post","ror":"https://ror.org/00p45d091","country_code":"KR","type":"government","lineage":["https://openalex.org/I2799891827","https://openalex.org/I2801339556","https://openalex.org/I4387152098"]},{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sung Je HONG","raw_affiliation_strings":["Department of Electrical Engineering, POSTECH"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, POSTECH","institution_ids":["https://openalex.org/I2799891827","https://openalex.org/I123900574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016291668","display_name":"Pil Joong Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I2799891827","display_name":"Korea Post","ror":"https://ror.org/00p45d091","country_code":"KR","type":"government","lineage":["https://openalex.org/I2799891827","https://openalex.org/I2801339556","https://openalex.org/I4387152098"]},{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Pil Joong LEE","raw_affiliation_strings":["Department of Electrical Engineering, POSTECH"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, POSTECH","institution_ids":["https://openalex.org/I2799891827","https://openalex.org/I123900574"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.176,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":6,"citation_normalized_percentile":{"value":0.771464,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"E95.D","issue":"4","first_page":"1155","last_page":"1158"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.5840629},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.4391793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187474},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.70220566},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6700964},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.59311247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.58428806},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.5840629},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.567274},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.50544596},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.49003685},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46914},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44617233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44054165},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.4391793},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.2842641},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15007505},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e95.d.1155","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E95.D/4/E95.D_4_1155/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e95.d.1155","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E95.D/4/E95.D_4_1155/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.81,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1040242992","https://openalex.org/W1198482936","https://openalex.org/W1542255234","https://openalex.org/W1543653153","https://openalex.org/W1636344792","https://openalex.org/W1651148894","https://openalex.org/W1727616536","https://openalex.org/W2030032883","https://openalex.org/W2127785555"],"related_works":["https://openalex.org/W2388868631","https://openalex.org/W2388247877","https://openalex.org/W2379241680","https://openalex.org/W2362963703","https://openalex.org/W2354152081","https://openalex.org/W2351645295","https://openalex.org/W2158602785","https://openalex.org/W2133761101","https://openalex.org/W2001671835","https://openalex.org/W1581605569"],"abstract_inverted_index":{"Traditional":[0],"authentication":[1,20],"protocols":[2,14,95],"are":[3,15,61],"based":[4],"on":[5,83],"cryptographic":[6,30],"techniques":[7,31],"to":[8,32,48,63],"achieve":[9],"identity":[10,39],"verification.":[11,40],"Distance":[12],"bounding":[13,43,79],"an":[16],"enhanced":[17],"type":[18],"of":[19],"protocol":[21,44,80,89],"built":[22],"upon":[23],"both":[24],"signal":[25],"traversal":[26],"time":[27],"measurement":[28],"and":[29,54,96],"accomplish":[33],"distance":[34,42,56,66,78],"verification":[35],"as":[36,38],"well":[37],"A":[41],"is":[45,69,90],"usually":[46],"designed":[47],"defend":[49],"against":[50],"the":[51,55,65,84,104],"relay":[52,85,105],"attack":[53,68],"fraud":[57,67],"attack.":[58,86,106],"As":[59],"there":[60],"applications":[62],"which":[64],"not":[70],"a":[71,76,98],"serious":[72],"threat,":[73],"we":[74],"propose":[75],"streamlined":[77],"that":[81],"focuses":[82],"The":[87],"proposed":[88],"more":[91],"efficient":[92],"than":[93],"previous":[94],"has":[97],"low":[99],"false":[100],"acceptance":[101],"rate":[102],"under":[103]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2037025413","counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-01-18T07:56:04.873401","created_date":"2016-06-24"}