Survey of Distance Bounding Protocols and Threats

被引:12
|
作者
Brelurut, Agnes [1 ]
Gerault, David [1 ]
Lafourcade, Pascal [1 ]
机构
[1] Univ Clermont Auvergne, LIMOS, F-63000 Clermont Ferrand, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015) | 2016年 / 9482卷
关键词
Distance bounding; Threat models; Mafia fraud; Terrorist fraud; Distance fraud; RFID; NFC; Relay attack; Collusion fraud; CHALLENGES;
D O I
10.1007/978-3-319-30303-1_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
NFC and RFID are technologies that are more and more present in our life. These technologies allow a tag to communicate without contact with a reader. In wireless communication an intruder can always listen and forward a signal, so he can mount a so-called worm hole attack. In the last decades, several Distance Bounding (DB) protocols have been introduced to avoid such attacks. In this context, there exist several threat models: Terrorist Fraud, Mafia Fraud, Distance Fraud etc. We first show the links between the existing threat models. Then we list more than forty DB protocols and give the bounds of the best known attacks for different threat models. In some cases, we explain how we are able to improve existing attacks. Then, we present some advices to the designers of the DB protocols and to the intruders to mount some attacks.
引用
收藏
页码:29 / 49
页数:21
相关论文
共 50 条
  • [1] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [2] Group Distance Bounding Protocols
    Capkun, Srdjan
    El Defrawy, Karim
    Tsudik, Gene
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 302 - 312
  • [3] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [4] Towards Quantum Distance Bounding Protocols
    Abidin, Aysajan
    Marin, Eduard
    Singelee, Dave
    Preneel, Bart
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 151 - 162
  • [5] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159
  • [6] RFID Distance Bounding Protocols with Mixed Challenges
    Kim, Chong Hee
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (05) : 1618 - 1626
  • [7] A framework for analyzing RFID distance bounding protocols
    Avoine, Gildas
    Bingol, Muhammed Ali
    Kardas, Suleyman
    Lauradoux, Cedric
    Martin, Benjamin
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 289 - 317
  • [8] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [9] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [10] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51