Towards Secure Distance Bounding

被引:18
|
作者
Boureanu, Ioana [1 ]
Mitrokotsa, Aikaterini [2 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, CH-1227 Geneva, Switzerland
来源
基金
瑞士国家科学基金会;
关键词
PROTOCOL; AUTHENTICATION; CHALLENGES;
D O I
10.1007/978-3-662-43933-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far as we know, this is the first protocol with such all-encompassing security guarantees.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 50 条
  • [21] Quantum Distance Bounding
    Abidin, Aysajan
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 233 - 238
  • [22] Distance Lower Bounding
    Zheng, Xifan
    Safavi-Naini, Reihaneh
    Ahmadi, Hadi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 89 - 104
  • [23] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [24] Bounding Wasserstein Distance with Couplings
    Biswas, Niloy
    Mackey, Lester
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2024, 119 (548) : 2947 - 2958
  • [25] Distance Bounding with Delayed Responses
    Lee, Sangho
    Kim, Jin Seok
    Hong, Sung Je
    Kim, Jong
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (09) : 1478 - 1481
  • [26] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [27] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [28] Bounding restricted rotation distance
    Cleary, S
    Taback, J
    INFORMATION PROCESSING LETTERS, 2003, 88 (05) : 251 - 256
  • [29] Distance Bounding Based on PUF
    Igier, Mathilde
    Vaudenay, Serge
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 701 - 710
  • [30] Group Distance Bounding Protocols
    Capkun, Srdjan
    El Defrawy, Karim
    Tsudik, Gene
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 302 - 312