Towards Secure Distance Bounding

被引:18
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
[11]   Mutual Distance Bounding Protocols [J].
Avoine, Gildas ;
Kim, Chong Hee .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) :830-839
[12]   Distance Bounding Facing Both Mafia and Distance Frauds [J].
Trujillo-Rasua, Rolando ;
Martin, Benjamin ;
Avoine, Gildas .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) :5690-5698
[13]   Survey of Distance Bounding Protocols and Threats [J].
Brelurut, Agnes ;
Gerault, David ;
Lafourcade, Pascal .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 :29-49
[14]   The Poulidor Distance-Bounding Protocol [J].
Trujillo-Rasua, Rolando ;
Martin, Benjamin ;
Avoine, Gildas .
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 :239-+
[15]   Distance Bounding Protocol for Mutual Authentication [J].
Yum, Dae Hyun ;
Kim, Jin Seok ;
Hong, Sung Je ;
Lee, Pil Joong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) :592-601
[16]   Security of Distance-Bounding: A Survey [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Boureanu, Ioana ;
Capkun, Srdjan ;
Hancke, Gerhard ;
Kardas, Suleyman ;
Kim, Chong Hee ;
Lauradoux, Cedric ;
Martin, Benjamin ;
Munilla, Jorge ;
Peinado, Alberto ;
Rasmussen, Kasper Bonne ;
Singelee, Dave ;
Tchamkerten, Aslan ;
Trujillo-Rasua, Rolando ;
Vaudenay, Serge .
ACM COMPUTING SURVEYS, 2019, 51 (05)
[17]   RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud [J].
Entezari, Rahim ;
Bahramgiri, Hossein ;
Tajamolian, Mahnaz .
COMPUTER COMMUNICATIONS, 2017, 98 :97-105
[18]   Non-uniform Stepping Approach to RFID Distance Bounding Problem [J].
Gurel, Ali Ozhan ;
Arslan, Atakan ;
Akgun, Mete .
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 :64-78
[19]   Comparing distance bounding protocols: A critical mission supported by decision theory [J].
Avoine, Gildas ;
Mauw, Sjouke ;
Trujillo-Rasua, Rolando .
COMPUTER COMMUNICATIONS, 2015, 67 :92-102
[20]   Unilateral Distance Bounding Protocol with Bidirectional Challenges [J].
Park, Myung-Ho ;
Nam, Ki-Gon ;
Kim, Jin Seok ;
Yum, Dae Hyun ;
Lee, Pil Joong .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (01) :134-137