Towards Secure Distance Bounding

被引:18
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
[31]   The distance-bounding protocol based on Russian cryptographic algorithms [J].
Belsky, Vladimir ;
Chichaeva, Anastasiia ;
Shishkin, Vasily ;
Tsaregorodtsev, Kirill .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03) :485-495
[32]   The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al. [J].
Vladimir Belsky ;
Anastasiia Chichaeva ;
Vasily Shishkin ;
Kirill Tsaregorodtsev .
Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) :485-495
[33]   Eliminating rouge femtocells based on distance bounding protocol and geographic information [J].
Chen, Chien-Ming ;
Chen, Yao-Hsin ;
Lin, Yue-Hsun ;
Sun, Hung-Min .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (02) :426-433
[34]   RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks [J].
Kim, Chong Hee ;
Avoine, Gildas .
CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 :119-133
[35]   MEED: A Memory-efficient Distance Bounding Protocol with Error Detection [J].
Xin, Wei ;
Tang, Cong ;
Xiong, Hu ;
Wang, Yonggang ;
Sun, Huiping ;
Guan, Zhi ;
Chen, Zhong .
RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 :129-143
[36]   On the Use of m-Ary Challenges for RFID Distance Bounding Protocol [J].
Kim, Young-Sik ;
Kim, Sang-Hyo .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (09) :2028-2035
[37]   Location leakage in distance bounding: Why location privacy does not work [J].
Mitrokotsa, Aikaterini ;
Onete, Cristina ;
Vaudenay, Serge .
COMPUTERS & SECURITY, 2014, 45 :199-209
[38]   Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing [J].
Tanveer, Muhammad ;
Khan, Abd Ullah ;
Nguyen, Tu N. ;
Ahmad, Musheer ;
El-Latif, Ahmed A. Abd .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :3058-3070
[39]   Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate [J].
Kim, Chong Hee .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) :1078-1080
[40]   Lightweight non-distance-bounding means to address RFID relay attacks [J].
Tu, Yuju ;
Piramuthu, Selwyn .
DECISION SUPPORT SYSTEMS, 2017, 102 :12-21