2014
DOI: 10.1007/978-3-662-43933-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Distance Bounding

Abstract: Abstract. Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizing these protocols. We show several pitfalls making existing protocols insecure (or at least, vulnerable, in some cases). Then, we introduce the SKI protocol which enjoys resistance to all popular attack-models and features provable security. As far … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
48
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 35 publications
(48 citation statements)
references
References 31 publications
0
48
0
Order By: Relevance
“…Classic distance bounding protocols have been widely studied in the literature and elegant solutions have been proposed [18,10,8,6]. These protocols assume that card and reader share a secret and then measure the time it takes to exchange a number of bits.…”
Section: Introductionmentioning
confidence: 99%
“…Classic distance bounding protocols have been widely studied in the literature and elegant solutions have been proposed [18,10,8,6]. These protocols assume that card and reader share a secret and then measure the time it takes to exchange a number of bits.…”
Section: Introductionmentioning
confidence: 99%
“…We compare with other distance bounding protocols. The parameters in pufDB, SKI [5,6], FO [14,33] and DBopt [7] are taken such that the protocols achieve 99% completeness with a noise of 5% as it is described in [7]. (I.e., we adjust E max to have 99% completeness and obtain different figures than in the previoous table.)…”
Section: Resultsmentioning
confidence: 99%
“…Most of the proposed protocols are vulnerable to TF attacks but a few protocols provide security against all types of threats: the protocol of Fischlin and Onete [14], the SKI protocol [5,6], DBopt protocols [7], the public-key DB protocols ProProx [35] and eProProx [34], and the anonymous DB protocol SPADE [9]. However, all these proofs are made on the assumption that in TF, the prover does not want to give his credential to the adversary for further application.…”
Section: Introductionmentioning
confidence: 99%
“…to [11,10, Table 1]). The protocols left standing in front of this attack are the SKI protocols [11,10] to be studied herein and the Fischlin-Onete protocol [24].…”
Section: Introductionmentioning
confidence: 99%