{"id":"https://openalex.org/W2767513345","doi":"https://doi.org/10.1109/tmc.2017.2771769","title":"Two-Hop Distance-Bounding Protocols: Keep Your Friends Close","display_name":"Two-Hop Distance-Bounding Protocols: Keep Your Friends Close","publication_year":2017,"publication_date":"2017-11-09","ids":{"openalex":"https://openalex.org/W2767513345","doi":"https://doi.org/10.1109/tmc.2017.2771769","mag":"2767513345"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2017.2771769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2017.2771769","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064902191","display_name":"Elena Pagnin","orcid":"https://orcid.org/0000-0002-7804-6696"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Elena Pagnin","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology, G\u00f6teborg, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology, G\u00f6teborg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035190728","display_name":"Aikaterini Mitrokotsa","orcid":"https://orcid.org/0000-0002-7073-0258"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Aikaterini Mitrokotsa","raw_affiliation_strings":["Department of Computer Science and Engineering, Chalmers University of Technology, G\u00f6teborg, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chalmers University of Technology, G\u00f6teborg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019818778","display_name":"Gerhard P. Hancke","orcid":"https://orcid.org/0000-0002-2388-3542"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Gerhard P. Hancke","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["CryptoBLK Limited, Hong Kong"],"affiliations":[{"raw_affiliation_string":"CryptoBLK Limited, Hong Kong","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025910280"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":3.7274,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94126389,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"17","issue":"7","first_page":"1723","last_page":"1736"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8776710629463196},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.6896090507507324},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6588743925094604},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5572444200515747},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.5200402736663818},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.5079064965248108},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.43099379539489746},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.42232874035835266},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39798274636268616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38936012983322144},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10721626877784729},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.08387210965156555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8776710629463196},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.6896090507507324},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6588743925094604},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5572444200515747},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.5200402736663818},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.5079064965248108},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.43099379539489746},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.42232874035835266},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39798274636268616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38936012983322144},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10721626877784729},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.08387210965156555},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tmc.2017.2771769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2017.2771769","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:www.alexandria.unisg.ch:262925","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400650","display_name":"Alexandria (UniSG) (University of St.Gallen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210158813","host_organization_name":"St.Gallen University of Teacher Education","host_organization_lineage":["https://openalex.org/I4210158813"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal paper"},{"id":"pmh:oai:research.chalmers.se:503705","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/503705","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W719168","https://openalex.org/W46722664","https://openalex.org/W168909259","https://openalex.org/W365850277","https://openalex.org/W1533298133","https://openalex.org/W1598297854","https://openalex.org/W1727616536","https://openalex.org/W1754999230","https://openalex.org/W1770547011","https://openalex.org/W1774314400","https://openalex.org/W1878267993","https://openalex.org/W2013665221","https://openalex.org/W2033230515","https://openalex.org/W2043659124","https://openalex.org/W2053081358","https://openalex.org/W2063068653","https://openalex.org/W2107130213","https://openalex.org/W2108217958","https://openalex.org/W2122690814","https://openalex.org/W2127785555","https://openalex.org/W2151993488","https://openalex.org/W2159796097","https://openalex.org/W2259246772","https://openalex.org/W2338009283","https://openalex.org/W2550711931","https://openalex.org/W4238608674","https://openalex.org/W4251010021","https://openalex.org/W6612356671","https://openalex.org/W6631925621","https://openalex.org/W6635934954","https://openalex.org/W6637778182","https://openalex.org/W6675795858","https://openalex.org/W6678372795"],"related_works":["https://openalex.org/W2899793048","https://openalex.org/W2950202488","https://openalex.org/W1594411369","https://openalex.org/W4385887367","https://openalex.org/W2027534055","https://openalex.org/W2519669146","https://openalex.org/W2089533936","https://openalex.org/W2042358705","https://openalex.org/W3031524031","https://openalex.org/W1436254147"],"abstract_inverted_index":{"Authentication":[0],"in":[1,55,72,77,95,136],"wireless":[2],"communications":[3],"often":[4],"depends":[5],"on":[6,23,46,131],"the":[7,24,47,50,56,60,70,89,113,118,122,148,167,174,184,188,195,202,214],"physical":[8,35],"proximity":[9,36,90],"to":[10,33,87,107,129,138,161,166,213],"a":[11,108,143,158],"location.":[12],"Distance-bounding":[13],"(DB)":[14],"protocols":[15,19,44,106,155,165,179,212],"are":[16,21],"cross-layer":[17],"authentication":[18],"that":[20,49,66,146],"based":[22],"round-trip-time":[25],"of":[26,59,91,117,121,152,176,187,197,204],"challenge-response":[27],"exchanges":[28],"and":[29,37,124,156,180,201,217],"can":[30],"be":[31,69],"employed":[32],"guarantee":[34],"combat":[38],"relay":[39],"attacks.":[40],"However,":[41],"traditional":[42,104,163],"DB":[43,105,154,164,178,211],"rely":[45,130],"assumption":[48],"prover":[51,114],"(e.g.,":[52,62],"user)":[53],"is":[54,115],"communication":[57,119],"range":[58,120],"verifier":[61,123],"access":[63,74],"point);":[64],"something":[65],"might":[67],"not":[68],"case":[71,169],"multiple":[73],"control":[75],"scenarios":[76],"ubiquitous":[78],"computing":[79],"environments":[80],"as":[81,83],"well":[82],"when":[84,112],"we":[85,102,193,218],"need":[86,128],"verify":[88,139],"our":[92,198,205],"two-hop":[93,109,168,177,215],"neighbour":[94],"an":[96,132],"ad-hoc":[97],"network.":[98],"In":[99],"this":[100],"paper,":[101],"extend":[103,162],"setting,":[110],"i.e.,":[111],"out":[116],"thus,":[125],"they":[126],"both":[127],"untrusted":[133],"in-between":[134],"entity":[135],"order":[137],"proximity.":[140],"We":[141,172],"present":[142],"formal":[144],"framework":[145],"captures":[147],"most":[149],"representative":[150],"classes":[151],"existing":[153,210],"provide":[157],"general":[159],"method":[160],"(three":[170],"participants).":[171],"analyze":[173],"security":[175,185,199],"identify":[181],"connections":[182],"with":[183,222],"issues":[186],"corresponding":[189],"one-hop":[190],"case.":[191],"Finally,":[192],"demonstrate":[194],"correctness":[196],"analysis":[200],"efficiency":[203],"model":[206],"by":[207],"transforming":[208],"five":[209],"setting":[216],"evaluate":[219],"their":[220],"performance":[221],"simulated":[223],"experiments.":[224]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
