Towards Secure Distance Bounding

被引:18
|
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
  • [11] Secure Distance Bounding Protocol on TH-UWB
    Miri, Jamel
    Nsiri, Bechir
    Bouallegue, Ridha
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 5 - 9
  • [12] On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
    Cagalj, Mario
    Saxena, Nitesh
    Uzun, Ersin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 443 - +
  • [13] New Attacks and Secure Design for Anonymous Distance-Bounding
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    Akand, Mamunur
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 598 - 616
  • [14] Secure Positioning with Non-Ideal Distance Bounding Protocols
    Perazzo, Pericle
    Dini, Gianluca
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 907 - 912
  • [15] Building ToF Resiliency Into UWB-Based Secure Distance Bounding Protocols
    Nkrowl, Raphael E.
    Boshoffl, Dutliff
    Silval, Bruno J.
    Liu, Zhe
    Hanekel, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [16] Private and Secure Public-Key Distance Bounding Application to NFC Payment
    Vaudenay, Serge
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 207 - 216
  • [17] Towards more efficient distance bounding protocols for use in sensor networks
    Meadows, Catherine
    Syverson, Paul
    Chang, Liwu
    2006 SECURECOMM AND WORKSHOPS, 2006, : 41 - +
  • [18] Towards More Security Distance Bounding Protocol to prevent relay attacks
    Zhou, Jingxian
    Xiao, Feng
    Gu, Zhaojun
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1741 - 1748
  • [19] Defining Secure Areas for TDOA-Enhanced Non-Ideal Distance Bounding
    Torres, Nuria Ballber
    Etzlinger, Bernhard
    Dehmollaian, Eshagh
    Springer, Andreas
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 348 - 353
  • [20] Challenges in Distance Bounding
    Boureanu, Ioana
    Vaudenay, Serge
    IEEE SECURITY & PRIVACY, 2015, 13 (01) : 41 - 48