EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Proceedings of the 2nd ACM workshop on Wireless security
WiSE '03 2003 ACM Workshop on Wireless Security ( co-located with Mobicom 2003 Conference )
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Let's Get Physical: Models and Methods for Real-World Security Protocols
TPHOLs '09 Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Effectiveness of distance-decreasing attacks against impulse radio ranging
Proceedings of the third ACM conference on Wireless network security
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Distance bounding in noisy environments
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Multi-channel key agreement using encrypted public key exchange
Proceedings of the 15th international conference on Security protocols
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
A formal approach to distance-bounding RFID protocols
ISC'11 Proceedings of the 14th international conference on Information security
A note on a privacy-preserving distance-bounding protocol
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Make noise and whisper: a solution to relay attacks
SP'11 Proceedings of the 19th international conference on Security Protocols
Physical-layer attacks on chirp-based ranging systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Threshold-Based Location-Aware Access Control
International Journal of Handheld Computing Research
Hi-index | 0.00 |
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, Perrig and Johnson (2003), Sastry, Shankar and Wagner (2003), and Čapkun and Hubaux (2005, 2006) are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits. We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols. The attacker can exploit this to appear closer himself or to perform a relaying attack against other nodes. We describe attack strategies to achieve this, including optimizing the communication protocol stack, taking early decisions as to the value of received bits and modifying the waveform of transmitted bits. We consider applying distance-bounding protocols to constrained devices and evaluate existing proposals for distance bounding in ad hoc networks.