Modeling Enlargement Attacks Against UWB Distance Bounding Protocols

被引:9
|
作者
Compagno, Alberto [1 ]
Conti, Mauro [2 ]
D'Amico, Antonio Alberto [3 ]
Dini, Gianluca [3 ]
Perazzo, Pericle [3 ]
Taponecco, Lorenzo [3 ]
机构
[1] Univ Roma La Sapienza, Dept Comp Sci, Piazzale Aldo Moro 5, I-00185 Rome, Italy
[2] Univ Padua, Dept Math, I-35122 Padua, Italy
[3] Univ Pisa, Dept Informat Engn, I-56126 Pisa, Italy
基金
欧盟地平线“2020”;
关键词
Security; ranging; distance bounding; enlargement attacks; ultrawideband;
D O I
10.1109/TIFS.2016.2541613
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distance bounding protocols make it possible to determine a trusted upper bound on the distance between two devices. Their key property is to resist reduction attacks, i.e., attacks aimed at reducing the distance measured by the protocol. Recently, researchers have also focused on enlargement attacks, aimed at enlarging the measured distance. Providing security against such attacks is important for secure positioning techniques. The contribution of this paper is to provide a probabilistic model for the success of an enlargement attack against a distance bounding protocol realized with the IEEE 802.15.4a ultra-wideband standard. The model captures several variables, such as the propagation environment, the signal-to-noise ratio, and the time-of-arrival estimation algorithm. We focus on non-coherent receivers, which can be used in low-cost low-power applications. We validate our model by comparison with physical-layer simulations and goodness-of-fit tests. The results show that our probabilistic model is sufficiently realistic to replace physical-layer simulations. Our model can be used to evaluate the security of the ranging/positioning solutions that can be subject to enlargement attacks. We expect that it will significantly facilitate future research on secure ranging and secure positioning.
引用
收藏
页码:1565 / 1577
页数:13
相关论文
共 50 条
  • [21] Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
    Leu, Patrick
    Camurati, Giovanni
    Heinrich, Alexander
    Roeschlin, Marc
    Anliker, Claudio
    Hollick, Matthias
    Capkun, Srdjan
    Classen, Jiska
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1343 - 1359
  • [22] Secure Distance Bounding Protocol on TH-UWB
    Miri, Jamel
    Nsiri, Bechir
    Bouallegue, Ridha
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 5 - 9
  • [23] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding
    Trujillo-Rasua, Rolando
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302
  • [24] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [25] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [26] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [27] Key establishment using secure distance bounding protocols
    Singelee, Dave
    Preneel, Bart
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
  • [28] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [29] Optimal Security Limits of RFID Distance Bounding Protocols
    Kara, Orhun
    Kardas, Suleyman
    Bingol, Muhammed Ali
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
  • [30] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227