YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL

Ventzislav Nikov, Marc Vauclair

2008

Abstract

Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. In this paper, a new secure distance-bounding protocol is presented. It is self-contained and composable with other protocols for example for authentication or key-negotiation. It allows periodically execution and achieves better use of the communication channels by exchanging authenticated nonces. The proposed protocol becomes suitable for wider class of devices, since the resource requirements to the prover are relaxed.

References

  1. Anderson, R. (2001). Security engineering: A guide to building dependable distributed systems. John Wiley and Sons.
  2. B. Waters, E. F. (2003). Secure, private proofs of location. Princeton Computer Science TR-667-03.
  3. D. Singelee, B. P. (2005). Location verification using secure distance bounding protocols. IEEE Computer Society pp. 834-840.
  4. Desmedt, Y. (1988). Major security problems with “unforgeable” (feige)- at- shamir proofs of identity and how to overcome them. SecuriCom'88.
  5. G. Hancke, M. K. (2005). An rfid distance bounding protocol. IEEE SecureComm pp. 67-73.
  6. J. Reid, J. Neito, T. T. B. S. (2007). Detecting relay attacks with timing based protocols. ACM ASIACCS pp. 204-213.
  7. L. Bussard, W. B. (2005). Distance-bounding proof of knowledge to avoid real-time attacks. In IFIP/SEC.
  8. N. Sastry, U. Shankar, D. W. (2003). Secure verification of location claims. ACM Workshop on Wireless Security pp. 48-61.
  9. S. Brands, D. C. (1993). Distance-bounding protocols. In EUROCRYPT'93. LNCS 765 pp. 344-359.
  10. S. Capkun, J.-P. H. (2006). Secure positioning in wireless networks. IEEE Selected Areas in Communications vol.24, no.2, pp. 221-232.
Download


Paper Citation


in Harvard Style

Nikov V. and Vauclair M. (2008). YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 218-221. DOI: 10.5220/0001926402180221


in Bibtex Style

@conference{secrypt08,
author={Ventzislav Nikov and Marc Vauclair},
title={YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={218-221},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001926402180221},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL
SN - 978-989-8111-59-3
AU - Nikov V.
AU - Vauclair M.
PY - 2008
SP - 218
EP - 221
DO - 10.5220/0001926402180221