Realization of RF distance bounding

作者: Kasper Bonne Rasmussen , Srdjan Čapkun

DOI:

关键词:

摘要: One of the main obstacles for wider deployment radio (RF) distance bounding is lack platforms that implement these protocols. We address this problem and we build a prototype system demonstrates protocols can be implemented to match strict processing require. Our implements prover able receive, process transmit signals in less than 1ns. The security guarantee protocol built on top therefore provides malicious can, at most, pretend about 15cm closer verifier it really is. To enable such fast prover, use specially concatenation as prover's function show how integrated into protocol. Finally, functions XOR comparison function, were used number previously proposed protocols, are not best suited implementation bounding.

参考文章(29)
Colin A. Boyd, Anish Mathuria, Protocols for Key Establishment and Authentication Springer-Verlag New York, Inc.. ,(2003)
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Position Based Cryptography international cryptology conference. ,vol. 5677, pp. 391- 407 ,(2009) , 10.1007/978-3-642-03356-8_23
Saar Drimer, Steven J Murdoch, None, Keep your enemies close: distance bounding against smartcard relay attacks usenix security symposium. pp. 7- ,(2007)
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore, So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Lecture Notes in Computer Science. pp. 83- 97 ,(2006) , 10.1007/11964254_9
Thomas Beth, Yvo Desmedt, Identification Tokens - or: Solving the Chess Grandmaster Problem international cryptology conference. pp. 169- 177 ,(1990) , 10.1007/3-540-38424-3_12
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Nils Ole Tippenhauer, Srdjan Čapkun, ID-based secure distance bounding and localization european symposium on research in computer security. pp. 621- 636 ,(2009) , 10.1007/978-3-642-04444-1_38
Colin Boyd, Anish Mathuria, Douglas Stebila, Protocols for Authentication and Key Establishment ,(2003)
Gerhard P. Hancke, Markus G. Kuhn, Attacks on time-of-flight distance bounding channels wireless network security. pp. 194- 202 ,(2008) , 10.1145/1352533.1352566
Sahar Sedighpour, Srdjan Čapkun, Saurabh Ganeriwal, Mani Srivastava, Distance enlargement and reduction attacks on ultrasound ranging Proceedings of the 3rd international conference on Embedded networked sensor systems - SenSys '05. pp. 312- 312 ,(2005) , 10.1145/1098918.1098977