Towards Secure Distance Bounding

被引:18
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
  • [21] RFID Distance Bounding Protocols with Mixed Challenges
    Kim, Chong Hee
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (05) : 1618 - 1626
  • [22] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding
    Trujillo-Rasua, Rolando
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302
  • [23] A framework for analyzing RFID distance bounding protocols
    Avoine, Gildas
    Bingol, Muhammed Ali
    Kardas, Suleyman
    Lauradoux, Cedric
    Martin, Benjamin
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 289 - 317
  • [24] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27
  • [25] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [26] Optimal Security Limits of RFID Distance Bounding Protocols
    Kara, Orhun
    Kardas, Suleyman
    Bingol, Muhammed Ali
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
  • [27] Dynamic Membership Management in Anonymous and Deniable Distance Bounding
    Jho, Nam-Su
    Youn, Taek-Young
    SUSTAINABILITY, 2020, 12 (24) : 1 - 16
  • [28] Distance Bounding Protocol with Adjustable False Acceptance Rate
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 434 - 436
  • [29] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [30] Lightweight Distance Bounding Protocol against Relay Attacks
    Kim, Jin Seok
    Cho, Kookrae
    Yum, Dae Hyun
    Hong, Sung Je
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (04): : 1155 - 1158