A note on a privacy-preserving distance-bounding protocol

作者: Jean-Philippe Aumasson , Aikaterini Mitrokotsa , Pedro Peris-Lopez

DOI: 10.1007/978-3-642-25243-3_7

关键词: Identification (information)Spoofing attackAttack surfaceComputer scienceSecurity analysisDistance-bounding protocolBounding overwatchComputer networkComputer securityRelayProtocol (object-oriented programming)

摘要: Distance bounding protocols enable a device to establish an upper bound on the physical distance communication partner so as prevent location spoofing, exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these leak information of parties external observers, which is undesirable in number applications--for example if leaked leads identification among group devices. To remedy this problem, authors proposed "privacy-preserving" protocol, i.e. leaks no parties. The present paper reports results from in-depth security analysis new with main result attack recovers ephemeral secrets well two for particular choices parameters. Overall, our do not contradict preliminary designers, but rather extends it other parts surface.

参考文章(26)
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore, So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Lecture Notes in Computer Science. pp. 83- 97 ,(2006) , 10.1007/11964254_9
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Aurélien Francillon, Boris Danev, Srdjan Capkun, None, Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars network and distributed system security symposium. ,(2011) , 10.3929/ETHZ-A-006708714
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira, The Swiss-Knife RFID Distance Bounding Protocol international conference on information security and cryptology. pp. 98- 115 ,(2009) , 10.1007/978-3-642-00730-9_7
Laurent Bussard, Walid Bagga, Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks information security conference. pp. 223- 238 ,(2005) , 10.1007/0-387-25660-1_15
Erik Zenner, Nonce Generators and the Nonce Reset Problem international conference on information security. pp. 411- 426 ,(2009) , 10.1007/978-3-642-04474-8_33
Alberto Peinado, Jorge Munilla, Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels communications and mobile computing. ,vol. 8, pp. 1227- 1232 ,(2008) , 10.1002/WCM.V8:9
C P Schnorr, A Shamir, An optimal sorting algorithm for mesh connected computers symposium on the theory of computing. pp. 255- 263 ,(1986) , 10.1145/12130.12156
S. Gezici, Zhi Tian, G.B. Giannakis, H. Kobayashi, A.F. Molisch, H.V. Poor, Z. Sahinoglu, Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks IEEE Signal Processing Magazine. ,vol. 22, pp. 70- 84 ,(2005) , 10.1109/MSP.2005.1458289