Towards Secure Distance Bounding

被引:18
|
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
  • [1] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257
  • [2] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [4] On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
    Cagalj, Mario
    Saxena, Nitesh
    Uzun, Ersin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 443 - +
  • [5] RFID Distance Bounding Multistate Enhancement
    Avoine, Gildas
    Floerkemeier, Christian
    Martin, Benjamin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 290 - +
  • [6] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [7] Mechanised Models and Proofs for Distance-Bounding
    Boureanu, Ioana
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Gerault, David
    Lafourcade, Pascal
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 591 - 606
  • [8] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [9] A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol
    Entezari, Rahim
    Bahramgiri, Hossein
    Tajamolian, Mahnaz
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 67 - 72
  • [10] Distance Bounding with Delayed Responses
    Lee, Sangho
    Kim, Jin Seok
    Hong, Sung Je
    Kim, Jong
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (09) : 1478 - 1481