Towards Secure Distance Bounding

被引:18
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
[41]   Towards Forward Secure Internet Traffic [J].
Alashwali, Eman Salem ;
Szalachowski, Pawel ;
Martin, Andrew .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 :341-364
[42]   Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR [J].
Youn, Taek-Young ;
Hong, Dowon .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (05) :930-935
[43]   Mutual Implementation of Predefined and Random Challenges over RFID Distance Bounding Protocol [J].
Jannati, Hoda ;
Falahati, Abolfazl .
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, :43-47
[44]   Distance-bounding proof of knowledge to avoid real-time attacks [J].
Bussard, L ;
Bagga, W .
SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 :223-238
[45]   Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding [J].
Kachhia, Ruchi ;
Agrawal, Prachi ;
Das, Manik Lal .
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 :339-348
[46]   Multihop Distance-Bounding for Improving Security and Efficiency of Ad-Hoc Networks [J].
Luo, Hanguang ;
Wen, Guangjun ;
Su, Jian ;
Huang, Zhong ;
Inserra, Daniele .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5312-5323
[47]   An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach [J].
Jannati, Hoda ;
Falahati, Abolfazl .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) :711-726
[48]   Two-Hop Distance-Bounding Protocols: Keep Your Friends Close [J].
Yang, Anjia ;
Pagnin, Elena ;
Mitrokotsa, Aikaterini ;
Hancke, Gerhard P. ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (07) :1723-1736
[49]   Towards Secure Traffic Signaling in Smart Grids [J].
Nyangaresi, Vincent Omollo ;
Alsamhi, Saeed Hamood .
2021 IEEE 3RD GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2021), 2021, :196-201
[50]   TOWARDS SECURE AND LEGAL E-TENDERING [J].
Betts, Martin ;
Black, Peter ;
Christensen, Sharon ;
Dawson, Ed ;
Du, Rong ;
Duncan, William ;
Foo, Ernest ;
Gonzalez, Juan .
JOURNAL OF INFORMATION TECHNOLOGY IN CONSTRUCTION, 2006, 11 :89-102