DOI: 10.1007/978-3-540-73275-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Distance Bounding in Noisy Environments

Abstract: Abstract. Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt'93 to preclude distance fraud and mafia fraud attacks, in which a local impersonator exploits a remote honest user. Hancke and Kuhn have extended these protocols to cope with noisy channels. This paper presents an improved distance bounding protocol for noisy channels that offers a substanti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(63 citation statements)
references
References 13 publications
(17 reference statements)
0
63
0
Order By: Relevance
“…However the proof based on measuring signal strength is not secure as an adversary can easily amplify signal strength as desired or use stronger signals to read from afar. Therefore many works are devoted to devise efficient distance bounding protocols by measuring round-trip time [2,3,7,10,11,4,[14][15][16].…”
Section: Relay Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…However the proof based on measuring signal strength is not secure as an adversary can easily amplify signal strength as desired or use stronger signals to read from afar. Therefore many works are devoted to devise efficient distance bounding protocols by measuring round-trip time [2,3,7,10,11,4,[14][15][16].…”
Section: Relay Attacksmentioning
confidence: 99%
“…A solution to reduce the aforementioned probability below 3 4 is to include a signing message (or message authentication code) as used in other protocols [2,14,15]. However a signing message could not be sent with the channel for fast bit exchanges as it is very sensitive to the background noise.…”
Section: Distance Bounding Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the fast phase allows the verifier to check both authentication and distance. Most of existing works derive from either Brands and Chaum's protocol [45,54,57,71] or Hancke and Kuhn's protocol [3,43,60,67,74]. The proposal in [77] is from this perspective an ''hybrid'' protocol.…”
Section: Main Approachesmentioning
confidence: 99%
“…However, the feasibility of the scheme is questionable since it requires three physical states {0, 1, void}. Singelee and Preneel [71] proposed a distance-bounding protocol, which uses an error correction code to facilitate the corrections of errors (in noisy channels) during the rapid bit exchange. Nevertheless, this scheme's security and implementation cost on RFID tags is questioned in [55].…”
Section: Recent Variantsmentioning
confidence: 99%