Towards Secure Distance Bounding
نویسندگان
چکیده
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees. 1 Why Distance-Bounding? It is well known that a chess beginner can win against a chess grand-master easily by defeating two grand-masters concurrently, taking different colors in both games, and relaying the move of one master to the other. This is a pure relay attack where two masters play against each other while each of them thinks he is playing against a beginner. In real life, relay attacks find applications in access control. For instance, a car with a wireless key can be opened by relaying the communication between the key (the token) and the car. RFID-based access control to buildings can also be subject to relay attacks [21]. The same goes for (contactless) credit-card payments: a customer may try to pay for something on a malicious terminal which relays to a fake card paying for something more expensive [15]. To defeat relay attacks, Brands and Chaum [9] introduced the notion of distance bounding protocol. This relies on the fact that information is local and it cannot travel faster than light. So, an RFID reader can identify when participants are close enough because the round-trip communication time has been small enough. The idea is that a prover holding a key x proves to a verifier that he is close to him. Ideally, this notion should behave like a traditional interactive proof system in the sense that it must satisfy: – completeness (i.e., an honest prover close to the verifier will pass the protocol with high probability) ? This invited paper summarizes results from [4,5,6,7,8]. – soundness (i.e., if the verifier accepts the protocol, then it must be the case that the information held by all close participants includes x) – security (i.e., if the prover honestly runs the protocol, the provided information does not provide any advantage to defeat soundness). The last property is weaker than zero-knowledge and is generally required in identification protocols. In practice, the literature does not define distance-bounding like this but rather considers several popular threat models, as per the following summary. – Distance fraud [9]: a far-away malicious prover tries to pass the protocol. – Mafia fraud [14]: an adversary between a far-away honest prover and a verifier tries to get advantage of his position to make the verifier accept. (This generalizes relay attacks as the adversary may also modify messages.) – Terrorist fraud [14]: a far-away malicious prover, with the help of an adversary, tries to make the verifier accept, but without giving the adversary any advantage to later pass the protocol alone. For instance, the malicious prover wants to make the verifier accept, although he is far away, but does not want to give his secret x to the adversary. – Impersonation fraud [3]: An adversary tries to impersonate the prover and make the verifier accept. – Distance hijacking [13]: A far-away prover takes advantage of some honest provers running the protocol to make the verifier accept. In our model [8], we factor all these common threats into three possible frauds. – Distance fraud: this is the classical notion in which we also consider concurrency with many other participants. I.e., we include other possible provers (with other secrets) and verifiers. Consequently, our generalized distance fraud also includes distance hijacking. – Man-in-the-middle: we consider an adversary (maybe at several locations) who can interact with many honest provers (possibly with different keys) and verifiers during a learning phase. Then, the attack phase contains honest provers with the key x, far away from a verifier V , and possibly many other honest provers (with other keys) and other verifiers. The goal of the adversary is to makeV accept the prover holding x. Clearly, this generalizes mafia fraud and includes impersonation fraud. – Collusion fraud: A far-away prover holding x helps an adversary to make the verifier accept the proof. This might be in the presence of many other honest participants. However, there should be no man-in-the-middle attack constructed based on this malicious prover. I.e., the adversary should not extract from him any advantage to run (later) a man-in-the-middle attack. Ideally, we could just keep this last notion which includes all others and is closer to the soundness and the security notion in the interactive proof system. We summarize the best security results for many existing distance-bounding protocols. Table 1 gives the probability of success of the best known attacks. This table does not consider possibly bad pseudorandom function (PRF) instances [5] nor any terrorist fraud based on noise tolerance [19]. These aspects will be discussed later in the present paper. For collusion-frauds, we consider a prover leaking all but ν bits of his secret.
منابع مشابه
Private and Secure Public-Key Distance Bounding - Application to NFC Payment
Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.
متن کاملPrivate and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper
Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.
متن کاملID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure distance measurement as elemental building block, and enables the implementation of secure distance bounding using commercial off-the-shelf (COTS) ranging devices. We use the proposed protocol to implement secure radio...
متن کاملYet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new protocols have been proposed the last five
متن کاملDesign of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...
متن کاملOn the Need for Secure Distance-Bounding
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers’ outputs have recently been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013