Towards Secure Distance Bounding

被引:18
|
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
  • [11] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [12] Distance Bounding Facing Both Mafia and Distance Frauds
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) : 5690 - 5698
  • [13] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [14] Survey of Distance Bounding Protocols and Threats
    Brelurut, Agnes
    Gerault, David
    Lafourcade, Pascal
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
  • [15] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [16] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [17] RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud
    Entezari, Rahim
    Bahramgiri, Hossein
    Tajamolian, Mahnaz
    COMPUTER COMMUNICATIONS, 2017, 98 : 97 - 105
  • [18] Comparing distance bounding protocols: A critical mission supported by decision theory
    Avoine, Gildas
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2015, 67 : 92 - 102
  • [19] Non-uniform Stepping Approach to RFID Distance Bounding Problem
    Gurel, Ali Ozhan
    Arslan, Atakan
    Akgun, Mete
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 64 - 78
  • [20] RFID Distance Bounding Protocols with Mixed Challenges
    Kim, Chong Hee
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (05) : 1618 - 1626