Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement

被引:13
作者
Leu, Patrick [1 ]
Singh, Mridula [1 ]
Roeschlin, Marc [1 ]
Paterson, Kenneth G. [1 ]
Capkun, Srdjan [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) | 2020年
基金
欧洲研究理事会;
关键词
WIRELESS; ATTACKS;
D O I
10.1109/SP40000.2020.00010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure distance measurement and therefore secure Time-of-Arrival (ToA) measurement is critical for applications such as contactless payments, passive-keyless entry and start systems, and navigation systems. This paper initiates the study of Message Time of Arrival Codes (MTACs) and their security. MTACs represent a core primitive in the construction of systems for secure ToA measurement. By surfacing MTACs in this way, we are able for the first time to formally define the security requirements of physical-layer measures that protect ToA measurement systems against attacks. Our viewpoint also enables us to provide a unified presentation of existing MTACs (such as those proposed in distance-bounding protocols and in a secure distance measurement standard) and to propose basic principles for protecting ToA measurement systems against attacks that remain unaddressed by existing mechanisms. We also use our perspective to systematically explore the tradeoffs between security and performance that apply to all signal modulation techniques enabling ToA measurements.
引用
收藏
页码:500 / 516
页数:17
相关论文
共 34 条
[1]  
[Anonymous], 2012, ELEMENTS INFORM THEO
[2]  
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[3]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[4]   Survey of Distance Bounding Protocols and Threats [J].
Brelurut, Agnes ;
Gerault, David ;
Lafourcade, Pascal .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 :29-49
[5]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[6]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[7]   Integrity Regions: Authentication through Presence in Wireless Networks [J].
Capkun, Srdjan ;
Cagalj, Mario ;
Karame, Ghassan O. ;
Tippenhauer, Nils Ole .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (11) :1608-1621
[8]  
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[9]  
Danev B., 2011, P NETW DISTR SYST SE
[10]  
Flury M, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P117