Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding

被引:1
|
作者
Trujillo-Rasua, Rolando [1 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES | 2014年 / 131卷
关键词
Security; Relay attack; Distance bounding; Most frequent sequence; Graph; NP-complete; NP-hard; CHALLENGES; PROTOCOLS;
D O I
10.1007/978-3-319-11569-6_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding (DB) emerged as a countermeasure to the so-called relay attack, which affects several technologies such as RFID, NFC, Bluetooth, and Ad-hoc networks. A prominent family of DB protocols are those based on graphs, which were introduced in 2010 to resist both mafia and distance frauds. The security analysis in terms of distance fraud is performed by considering an adversary that, given a vertex labeled graph G = (V, E) and a vertex v is an element of V, is able to find the most frequent n-long sequence in G starting from v (MFS problem). However, to the best of our knowledge, it is still an open question whether the distance fraud security can be computed considering the aforementioned adversarial model. Our first contribution is a proof that the MFS problem is NP-Hard even when the graph is constrained to meet the requirements of a graph-based DB protocol. Although this result does not invalidate the model, it does suggest that a too-strong adversary is perhaps being considered (i.e., in practice, graph-based DB protocols might resist distance fraud better than the security model suggests.) Our second contribution is an algorithm addressing the distance fraud security of the tree-based approach due to Avoine and Tchamkerten. The novel algorithm improves the computational complexity O(2(2n+n)) of the naive approach to O(2(2n)n) where n is the number of rounds.
引用
收藏
页码:289 / 302
页数:14
相关论文
共 50 条
  • [31] Towards Secure Distance Bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 55 - 67
  • [32] Unilateral Distance Bounding Protocol with Bidirectional Challenges
    Park, Myung-Ho
    Nam, Ki-Gon
    Kim, Jin Seok
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (01) : 134 - 137
  • [33] GRAPH-BASED DETECTION OF SHILLING ATTACKS IN RECOMMENDER SYSTEMS
    Zhang, Zhuo
    Kulkarni, Sanjeev R.
    2013 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2013,
  • [34] Comparing distance bounding protocols: A critical mission supported by decision theory
    Avoine, Gildas
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2015, 67 : 92 - 102
  • [35] Revisiting Error-Correction in Precommitment Distance-Bounding Protocols
    Zhang, Jingyi
    Yang, Anjia
    Hu, Qiao
    Hancke, Gerhard Petrus
    Liu, Zhe
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) : 7097 - 7106
  • [36] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [37] Efficient Public-Key Distance Bounding Protocol
    Kilinc, Handan
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 873 - 901
  • [38] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [39] Algorithms and complexity results for graph-based pursuit evasion
    Borie, Richard
    Tovey, Craig
    Koenig, Sven
    AUTONOMOUS ROBOTS, 2011, 31 (04) : 317 - 332
  • [40] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159