作者: Jolyon Clulow , Gerhard P. Hancke , Markus G. Kuhn , Tyler Moore
DOI: 10.1007/11964254_9
关键词:
摘要: Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show proposed distance-bounding of Hu, Perrig and Johnson (2003), Sastry, Shankar Wagner Capkun Hubaux (2005, 2006) vulnerable a guessing attack where the malicious prover preemptively transmits guessed values for number response bits. also communication channels not optimized minimal latency imperil security protocols. The attacker can exploit this appear himself or perform relaying against other nodes. describe strategies achieve this, including optimizing protocol stack, taking early decisions as value received bits modifying waveform transmitted consider applying constrained devices evaluate existing proposals distance bounding in ad hoc networks.