Challenges in Distance Bounding

被引:16
作者
Boureanu, Ioana [1 ]
Vaudenay, Serge [2 ]
机构
[1] Akamai Technol Ltd, Cambridge, MA 02142 USA
[2] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, Lausanne, Switzerland
关键词
distance bounding; provable security; security; smartcard protocols; wireless authentication;
D O I
10.1109/MSP.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use of distance-bounding protocols. The authors discuss the core challenges of distance bounding, in terms of both theoretical and practical considerations, focusing on their security and the difficulties encountered in their design and implementation. The authors present their vision of the future of these protocols and of the possible paths toward their secure deployment. © 2003-2012 IEEE.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 15 条
  • [1] A framework for analyzing RFID distance bounding protocols
    Avoine, Gildas
    Bingol, Muhammed Ali
    Kardas, Suleyman
    Lauradoux, Cedric
    Martin, Benjamin
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 289 - 317
  • [2] Bay A., 2012, PROC INT C INF SECUR, P371
  • [3] Boureanu Ioana, 2013, Lightweight Cryptography for Security and Privacy. Second International Workshop, LightSec 2013. Revised Selected Papers: LNCS 8162, P97, DOI 10.1007/978-3-642-40392-7_8
  • [4] Boureanu Ioana, 2012, Progress in Cryptology - LATINCRYPT 2012. Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, P100, DOI 10.1007/978-3-642-33481-8_6
  • [5] Boureanu I., 2014, P 10 INT C INF SEC C
  • [6] Boureanu I., 2013, P 16 INF SEC C ISC 1
  • [7] Boureanu I., 2013, FAST SOFTWARE ENCRYP, V8424, P55
  • [8] Brands S., 1993, Advances in Cryptology-EUROCRYPT'93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings, P344, DOI [10.1007/3-540-48285-7_30, DOI 10.1007/3-540-48285-7_30]
  • [9] Dürholz U, 2011, LECT NOTES COMPUT SC, V7001, P47, DOI 10.1007/978-3-642-24861-0_4
  • [10] Fischlin M., 2013, 11th Int'l Conf. Applied Cryptography and Network Security (ACNS13), P414, DOI DOI 10.1007/978-3-642-38980-126