{"id":"https://openalex.org/W2092966226","doi":"https://doi.org/10.1109/iwcmc.2014.6906411","title":"Security analysis of NFC relay attacks using probabilistic model checking","display_name":"Security analysis of NFC relay attacks using probabilistic model checking","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2092966226","doi":"https://doi.org/10.1109/iwcmc.2014.6906411","mag":"2092966226"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2014.6906411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081079525","display_name":"\u039d\u03b9\u03ba\u03cc\u03bb\u03b1\u03bf\u03c2 \u0391\u03bb\u03b5\u03be\u03af\u03bf\u03c5","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Nikolaos Alexiou","raw_affiliation_strings":["KTH Royal Institute of Technology, School of Electrical Engineering, Stockholm, Sweden","[KTH Royal Institute of Technology School of Electrical Engineering, Stockholm, Sweden]"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, School of Electrical Engineering, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"[KTH Royal Institute of Technology School of Electrical Engineering, Stockholm, Sweden]","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080661611","display_name":"Stylianos Basagiannis","orcid":"https://orcid.org/0000-0002-4513-0541"},"institutions":[{"id":"https://openalex.org/I4210159603","display_name":"United Technologies Research Center","ror":"https://ror.org/04vxc1c96","country_code":"IE","type":"company","lineage":["https://openalex.org/I4210159603"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Stylianos Basagiannis","raw_affiliation_strings":["United Technologies Research Centre Cork, Ireland","United Technologies Research Centre, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"United Technologies Research Centre Cork, Ireland","institution_ids":["https://openalex.org/I4210159603"]},{"raw_affiliation_string":"United Technologies Research Centre, Cork, Ireland","institution_ids":["https://openalex.org/I4210159603"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004470460","display_name":"Sophia Petridou","orcid":"https://orcid.org/0000-0002-2593-6150"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Sophia Petridou","raw_affiliation_strings":["Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece","Department of Applied Informatics,  University of Macedonia, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]},{"raw_affiliation_string":"Department of Applied Informatics,  University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081079525"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.83838195,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87249975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"524","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.8205530643463135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8067912459373474},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.6149740219116211},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5709993243217468},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5308165550231934},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4698677957057953},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4610063433647156},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4480823874473572},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.43138065934181213},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.42006585001945496},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38079720735549927},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16373121738433838},{"id":"https://openalex.org/keywords/ultra-high-frequency","display_name":"Ultra high frequency","score":0.13882747292518616}],"concepts":[{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.8205530643463135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8067912459373474},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.6149740219116211},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5709993243217468},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5308165550231934},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4698677957057953},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4610063433647156},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4480823874473572},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43138065934181213},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.42006585001945496},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38079720735549927},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16373121738433838},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.13882747292518616},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2014.6906411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1490052377","https://openalex.org/W1518070019","https://openalex.org/W1543653153","https://openalex.org/W1862398452","https://openalex.org/W1966908214","https://openalex.org/W1973893058","https://openalex.org/W1980794044","https://openalex.org/W2045467487","https://openalex.org/W2045950625","https://openalex.org/W2053723436","https://openalex.org/W2127785555","https://openalex.org/W2155481610","https://openalex.org/W3098444230","https://openalex.org/W6629261913"],"related_works":["https://openalex.org/W2604111946","https://openalex.org/W2539674285","https://openalex.org/W1528295240","https://openalex.org/W420788411","https://openalex.org/W4246401508","https://openalex.org/W1984589288","https://openalex.org/W3012497282","https://openalex.org/W2792457398","https://openalex.org/W4252821595","https://openalex.org/W2898483019"],"abstract_inverted_index":{"Near":[0],"Field":[1],"Communication":[2],"(NFC)":[3],"is":[4,101],"a":[5,13,48,124],"short-ranged":[6],"wireless":[7],"communication":[8,52],"technology":[9],"envisioned":[10],"to":[11,29,42,54,97,103,111,129,165],"support":[12,112,166],"large":[14],"gamut":[15],"of":[16,106,115,132,150,170,187],"smart-device":[17],"applications,":[18],"such":[19],"as":[20,78],"payment":[21],"and":[22,50,63,89,95,109,142,182],"ticketing":[23],"applications.":[24,172],"Two":[25],"NFC-enabled":[26,61],"devices":[27,62],"need":[28],"be":[30,180],"in":[31,40],"close":[32],"proximity,":[33],"typically":[34],"less":[35],"than":[36],"10":[37],"cm":[38],"apart,":[39],"order":[41],"communicate.":[43],"However,":[44],"adversaries":[45],"can":[46,80,179],"use":[47],"secret":[49],"fast":[51],"channel":[53,141],"relay":[55,136],"data":[56],"between":[57,68],"two":[58],"distant":[59],"victim":[60],"thus,":[64],"force":[65],"NFC":[66,83,107,133,171],"link":[67],"them.":[69],"Relay":[70],"attacks":[71,137],"may":[72],"have":[73],"tremendous":[74],"consequences":[75],"for":[76,85],"security":[77,105,168],"they":[79,92],"bypass":[81],"the":[82,113,148,151,159,177,185],"requirement":[84],"short":[86],"range":[87],"communications":[88],"even":[90],"worse,":[91],"are":[93],"cheap":[94],"easy":[96],"launch.":[98],"Therefore,":[99],"it":[100],"important":[102],"evaluate":[104],"applications":[108],"countermeasures":[110],"emergence":[114],"this":[116,120],"new":[117],"technology.":[118],"In":[119],"work":[121],"we":[122,174,183],"present":[123],"probabilistic":[125,160],"model":[126,161],"checking":[127,162],"approach":[128],"verify":[130],"resiliency":[131],"protocol":[134],"against":[135],"based":[138],"on":[139],"protocol,":[140],"application":[143],"specific":[144],"parameters":[145],"that":[146],"affect":[147],"successfulness":[149,186],"attack.":[152],"We":[153],"perform":[154],"our":[155],"formal":[156],"analysis":[157,169],"within":[158],"environment":[163],"PRISM":[164],"automated":[167],"Finally,":[173],"demonstrate":[175],"how":[176],"attack":[178],"thwarted":[181],"discuss":[184],"potential":[188],"countermeasures.":[189]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
