EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Identification Tokens - or: Solving the Chess Grandmaster Problem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
IEEE Transactions on Mobile Computing
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
CSF '09 Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Effectiveness of distance-decreasing attacks against impulse radio ranging
Proceedings of the third ACM conference on Wireless network security
Position statement in RFID S&P panel: from relative security to perceived secure
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Ranging in a dense multipath environment using an UWB radio link
IEEE Journal on Selected Areas in Communications
How secret-sharing can defeat terrorist fraud
Proceedings of the fourth ACM conference on Wireless network security
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Group distance bounding protocols
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
On the requirements for successful GPS spoofing attacks
Proceedings of the 18th ACM conference on Computer and communications security
A formal approach to distance-bounding RFID protocols
ISC'11 Proceedings of the 14th international conference on Information security
Physical-layer attacks on chirp-based ranging systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Locanyms: towards privacy-preserving location-based services
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Threshold-Based Location-Aware Access Control
International Journal of Handheld Computing Research
Detection of reactive jamming in DSSS-based wireless networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Efficient, secure, private distance bounding without key updates
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure and resilient proximity-based access control
Proceedings of the 2013 international workshop on Data management & analytics for healthcare
The man who was there: validating check-ins in location-based services
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process and transmit signals in less than 1ns. The security guarantee that a distance bounding protocol built on top of this system therefore provides is that a malicious prover can, at most, pretend to be about 15cm closer to the verifier than it really is. To enable such fast processing at the prover, we use specially implemented concatenation as the prover's processing function and show how it can be integrated into a distance bounding protocol. Finally, we show that functions such as XOR and the comparison function, that were used in a number of previously proposed distance bounding protocols, are not best suited for the implementation of radio distance bounding.