Distance Hijacking Attacks on Distance Bounding Protocols – Abstract

نویسندگان

  • Cas Cremers
  • Kasper B. Rasmussen
  • Srdjan Čapkun
چکیده

Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on its distance to another device (the prover) [1]. A number of distance bounding protocols were proposed in recent years, which provide different performance and security guarantees. So far, several distance-bounding protocols were implemented, some using digital processing and short symbols, whereas others rely on analog processing and use signal streams [4]. The security of distance-bounding protocols was so far mainly evaluated by analyzing their resilience to three attack types: Distance Fraud, Mafia Fraud and Terrorist Fraud. In Distance Fraud, a sole dishonest prover convinces the verifier that he is at a different distance than he really is. In Mafia Fraud, the prover is honest, but an external attacker tries to modify the measured distance by interfering with the communication. In Terrorist Fraud, a dishonest prover colludes with an attacker that is closer to the verifier, to convince the verifier of a wrong distance to the prover. So far, it was assumed that distance bounding protocols that are resilient against these three attack types, are indeed secure. However, we show that many of these protocols, irrespective of their physical-layer implementation, are vulnerable to a fourth type of attack, which we coin Distance Hijacking. In Distance Hijacking attacks a dishonest prover P convinces

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...

متن کامل

Practical & Provably Secure Distance-Bounding

Distance-bounding is a practical solution to be used in security-sensitive contexts, to prevent relay attacks. Its applied cryptographic role is definitely spreading fast and it is clearly far reaching, extending from contactless payments to remote car unlocking. However, security models for distance-bounding are not well-established and, as far as we know, no existing protocol is proven to res...

متن کامل

Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory

Distance bounding protocols are security countermeasures designed to thwart relay attacks. Such attacks consist in relaying messages exchanged between two parties, making them believe they communicate directly with each other. Although distance bounding protocols have existed since the early nineties, this research topic resurrected with the deployment of contactless systems, against which rela...

متن کامل

RFID Distance Bounding Protocols

Almost all existing RFID tag/reader authentication protocols are vulnerable to mafia attacks and/or terrorist attacks from adversaries because of their inability to verify location of the tag. Several protocols have been proposed that purport to alleviate these forms of attacks. However, vulnerabilities have been identified in most of these protocols. We present and evaluate a modified distance...

متن کامل

Yet Another Secure Distance-Bounding Protocol

Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new protocols have been proposed the last five

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011