So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

作者: Jolyon Clulow , Gerhard P. Hancke , Markus G. Kuhn , Tyler Moore

DOI: 10.1007/11964254_9

关键词:

摘要: Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show proposed distance-bounding of Hu, Perrig and Johnson (2003), Sastry, Shankar Wagner Capkun Hubaux (2005, 2006) vulnerable a guessing attack where the malicious prover preemptively transmits guessed values for number response bits. also communication channels not optimized minimal latency imperil security protocols. The attacker can exploit this appear himself or perform relaying against other nodes. describe strategies achieve this, including optimizing protocol stack, taking early decisions as value received bits modifying waveform transmitted consider applying constrained devices evaluate existing proposals distance bounding in ad hoc networks.

参考文章(25)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
L. B. Michael, M. Ghavami, R. Kohno, Ultra-wideband signals and systems in communication engineering ,(2004)
David Chaum, Stefan Brands, Distance-Bounding Protocols (Extended Abstract). theory and application of cryptographic techniques. pp. 344- 359 ,(1993)
R. Zetik, J. Sachs, R. Thoma, UWB localization - active and passive approach [ultra wideband radar] instrumentation and measurement technology conference. ,vol. 2, pp. 1005- 1009 ,(2004) , 10.1109/IMTC.2004.1351232
Yih-Chun Hu, Adrian Perrig, David B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols workshop on wireless security. pp. 30- 40 ,(2003) , 10.1145/941311.941317
Brad Karp, H. T. Kung, GPSR: greedy perimeter stateless routing for wireless networks acm/ieee international conference on mobile computing and networking. pp. 243- 254 ,(2000) , 10.1145/345910.345953
Peng Ning, Wenliang Kevin Du, Donggang Liu, Attack-resistant location estimation in sensor networks information processing in sensor networks. pp. 99- 106 ,(2005) , 10.5555/1147685.1147704
G.P. Hancke, M.G. Kuhn, An RFID Distance Bounding Protocol international workshop on security. pp. 67- 73 ,(2005) , 10.1109/SECURECOMM.2005.56
Chris Karlof, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures Ad Hoc Networks. ,vol. 1, pp. 293- 315 ,(2003) , 10.1016/S1570-8705(03)00008-8