Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding

被引:1
|
作者
Trujillo-Rasua, Rolando [1 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES | 2014年 / 131卷
关键词
Security; Relay attack; Distance bounding; Most frequent sequence; Graph; NP-complete; NP-hard; CHALLENGES; PROTOCOLS;
D O I
10.1007/978-3-319-11569-6_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding (DB) emerged as a countermeasure to the so-called relay attack, which affects several technologies such as RFID, NFC, Bluetooth, and Ad-hoc networks. A prominent family of DB protocols are those based on graphs, which were introduced in 2010 to resist both mafia and distance frauds. The security analysis in terms of distance fraud is performed by considering an adversary that, given a vertex labeled graph G = (V, E) and a vertex v is an element of V, is able to find the most frequent n-long sequence in G starting from v (MFS problem). However, to the best of our knowledge, it is still an open question whether the distance fraud security can be computed considering the aforementioned adversarial model. Our first contribution is a proof that the MFS problem is NP-Hard even when the graph is constrained to meet the requirements of a graph-based DB protocol. Although this result does not invalidate the model, it does suggest that a too-strong adversary is perhaps being considered (i.e., in practice, graph-based DB protocols might resist distance fraud better than the security model suggests.) Our second contribution is an algorithm addressing the distance fraud security of the tree-based approach due to Avoine and Tchamkerten. The novel algorithm improves the computational complexity O(2(2n+n)) of the naive approach to O(2(2n)n) where n is the number of rounds.
引用
收藏
页码:289 / 302
页数:14
相关论文
共 50 条
  • [21] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [22] RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
    Kim, Chong Hee
    Avoine, Gildas
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 119 - 133
  • [23] Quantum Distance Bounding
    Abidin, Aysajan
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 233 - 238
  • [24] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [25] A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol
    Bultel, Xavier
    Gambs, Sebastien
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    Robert, Jean-Marc
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 121 - 133
  • [26] Distance-bounding proof of knowledge to avoid real-time attacks
    Bussard, L
    Bagga, W
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
  • [27] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [28] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [29] Novel graph distance measures based on intra-graph clustering and cluster distance
    Dickinson, PJ
    Bunke, H
    Dadej, A
    Kraetzl, M
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL, III, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 333 - 338
  • [30] Distance bounding in noisy environments
    Singelee, Dave
    Preneel, Bart
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 101 - +