Research Article

A Secure Distance-Bounding Protocol with Mutual Authentication

Table 4

The success probability of the adversary under different cases.

Different casesSuccess probability

Case II
Case III
Case IV
Case V
Case VI