Modeling Enlargement Attacks Against UWB Distance Bounding Protocols

被引:9
作者
Compagno, Alberto [1 ]
Conti, Mauro [2 ]
D'Amico, Antonio Alberto [3 ]
Dini, Gianluca [3 ]
Perazzo, Pericle [3 ]
Taponecco, Lorenzo [3 ]
机构
[1] Univ Roma La Sapienza, Dept Comp Sci, Piazzale Aldo Moro 5, I-00185 Rome, Italy
[2] Univ Padua, Dept Math, I-35122 Padua, Italy
[3] Univ Pisa, Dept Informat Engn, I-56126 Pisa, Italy
基金
欧盟地平线“2020”;
关键词
Security; ranging; distance bounding; enlargement attacks; ultrawideband;
D O I
10.1109/TIFS.2016.2541613
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding protocols make it possible to determine a trusted upper bound on the distance between two devices. Their key property is to resist reduction attacks, i.e., attacks aimed at reducing the distance measured by the protocol. Recently, researchers have also focused on enlargement attacks, aimed at enlarging the measured distance. Providing security against such attacks is important for secure positioning techniques. The contribution of this paper is to provide a probabilistic model for the success of an enlargement attack against a distance bounding protocol realized with the IEEE 802.15.4a ultra-wideband standard. The model captures several variables, such as the propagation environment, the signal-to-noise ratio, and the time-of-arrival estimation algorithm. We focus on non-coherent receivers, which can be used in low-cost low-power applications. We validate our model by comparison with physical-layer simulations and goodness-of-fit tests. The results show that our probabilistic model is sufficiently realistic to replace physical-layer simulations. Our model can be used to evaluate the security of the ranging/positioning solutions that can be subject to enlargement attacks. We expect that it will significantly facilitate future research on secure ranging and secure positioning.
引用
收藏
页码:1565 / 1577
页数:13
相关论文
共 20 条
[1]   Distance Bounding: A Practical Security Solution for Real-Time Location Systems [J].
Abu-Mahfouz, Adnan ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :16-27
[2]  
Boureanu I., 2013, P ISC, P1
[3]  
Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
[4]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[5]   Secure Location Verification Using Simultaneous Multilateration [J].
Chiang, Jerry T. ;
Haas, Jason J. ;
Choi, Jihyuk ;
Hu, Yih-Chun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) :584-591
[6]  
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[7]   Energy-based TOA estimation [J].
D'Amico, Antonio A. ;
Mengali, Umberto ;
Taponecco, Lorenzo .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (03) :838-847
[8]   TOA Estimation with the IEEE 802.15.4a Standard [J].
D'Amico, Antonio A. ;
Mengali, Umberto ;
Taponecco, Lorenzo .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (07) :2238-2247
[9]  
Dini G., 2013, ICNS 2013 9 INT C NE, P207
[10]  
Fischlin M., 2013, 11th Int'l Conf. Applied Cryptography and Network Security (ACNS13), P414