Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding

被引:1
|
作者
Trujillo-Rasua, Rolando [1 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES | 2014年 / 131卷
关键词
Security; Relay attack; Distance bounding; Most frequent sequence; Graph; NP-complete; NP-hard; CHALLENGES; PROTOCOLS;
D O I
10.1007/978-3-319-11569-6_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding (DB) emerged as a countermeasure to the so-called relay attack, which affects several technologies such as RFID, NFC, Bluetooth, and Ad-hoc networks. A prominent family of DB protocols are those based on graphs, which were introduced in 2010 to resist both mafia and distance frauds. The security analysis in terms of distance fraud is performed by considering an adversary that, given a vertex labeled graph G = (V, E) and a vertex v is an element of V, is able to find the most frequent n-long sequence in G starting from v (MFS problem). However, to the best of our knowledge, it is still an open question whether the distance fraud security can be computed considering the aforementioned adversarial model. Our first contribution is a proof that the MFS problem is NP-Hard even when the graph is constrained to meet the requirements of a graph-based DB protocol. Although this result does not invalidate the model, it does suggest that a too-strong adversary is perhaps being considered (i.e., in practice, graph-based DB protocols might resist distance fraud better than the security model suggests.) Our second contribution is an algorithm addressing the distance fraud security of the tree-based approach due to Avoine and Tchamkerten. The novel algorithm improves the computational complexity O(2(2n+n)) of the naive approach to O(2(2n)n) where n is the number of rounds.
引用
收藏
页码:289 / 302
页数:14
相关论文
共 50 条
  • [41] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [42] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [43] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [44] RFID Distance Bounding Multistate Enhancement
    Avoine, Gildas
    Floerkemeier, Christian
    Martin, Benjamin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 290 - +
  • [45] Optimal Security Limits of RFID Distance Bounding Protocols
    Kara, Orhun
    Kardas, Suleyman
    Bingol, Muhammed Ali
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
  • [46] Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols
    Alturki, Musab A.
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    Talcott, Carolyn
    CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY, 2018, : 60 - 71
  • [47] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 485 - 495
  • [48] Algorithms and complexity results for graph-based pursuit evasion
    Richard Borie
    Craig Tovey
    Sven Koenig
    Autonomous Robots, 2011, 31 : 317 - 332
  • [49] Persistent Distance Bounding for Mobile Provers
    Nkrow, Raphael E.
    Boshoff, Dutliff
    Silva, Bruno J.
    Liu, Zhe
    Hancke, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [50] An Efficient RFID Distance Bounding Protocol
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 367 - 376