Metadata only
Date
2011-08Type
- Report
ETH Bibliography
yes
Altmetrics
Abstract
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using existing informal and formal frameworks does not guarantee the absence of Distance Hijacking attacks. Show more
Publication status
publishedJournal / series
Cryptology ePrint ArchiveVolume
Pages / Article No.
Publisher
Cryptology ePrint ArchiveSubject
Applications / Distance bounding; Location verification; Position verification; Attacks; Hijacking; Multi-prover environmentOrganisational unit
03634 - Basin, David / Basin, David
03755 - Capkun, Srdan / Capkun, Srdan
Notes
Received 14 March 2011, Last revised 24 August 2011.More
Show all metadata
ETH Bibliography
yes
Altmetrics