Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding

被引:1
|
作者
Trujillo-Rasua, Rolando [1 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES | 2014年 / 131卷
关键词
Security; Relay attack; Distance bounding; Most frequent sequence; Graph; NP-complete; NP-hard; CHALLENGES; PROTOCOLS;
D O I
10.1007/978-3-319-11569-6_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding (DB) emerged as a countermeasure to the so-called relay attack, which affects several technologies such as RFID, NFC, Bluetooth, and Ad-hoc networks. A prominent family of DB protocols are those based on graphs, which were introduced in 2010 to resist both mafia and distance frauds. The security analysis in terms of distance fraud is performed by considering an adversary that, given a vertex labeled graph G = (V, E) and a vertex v is an element of V, is able to find the most frequent n-long sequence in G starting from v (MFS problem). However, to the best of our knowledge, it is still an open question whether the distance fraud security can be computed considering the aforementioned adversarial model. Our first contribution is a proof that the MFS problem is NP-Hard even when the graph is constrained to meet the requirements of a graph-based DB protocol. Although this result does not invalidate the model, it does suggest that a too-strong adversary is perhaps being considered (i.e., in practice, graph-based DB protocols might resist distance fraud better than the security model suggests.) Our second contribution is an algorithm addressing the distance fraud security of the tree-based approach due to Avoine and Tchamkerten. The novel algorithm improves the computational complexity O(2(2n+n)) of the naive approach to O(2(2n)n) where n is the number of rounds.
引用
收藏
页码:289 / 302
页数:14
相关论文
共 50 条
  • [1] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [2] Attacks on a distance bounding protocol
    Munilla, Jorge
    Peinado, Alberto
    COMPUTER COMMUNICATIONS, 2010, 33 (07) : 884 - 889
  • [3] On the optimal resistance against mafia and distance fraud in distance-bounding protocols
    Gil-Pons, Reynaldo
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2023, 210 : 69 - 78
  • [4] Lightweight Distance Bounding Protocol against Relay Attacks
    Kim, Jin Seok
    Cho, Kookrae
    Yum, Dae Hyun
    Hong, Sung Je
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (04): : 1155 - 1158
  • [5] Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
    Poturalski, Marcin
    Flury, Manuel
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Le Boudec, Jean-Yves
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1334 - 1344
  • [6] Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
    Jannati, Hoda
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 11 : 51 - 61
  • [7] A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol
    Entezari, Rahim
    Bahramgiri, Hossein
    Tajamolian, Mahnaz
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 67 - 72
  • [8] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [9] Distance Bounding Facing Both Mafia and Distance Frauds
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) : 5690 - 5698
  • [10] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94