Multichannel Protocols to Prevent Relay Attacks

نویسندگان

  • Frank Stajano
  • Ford-Long Wong
  • Bruce Christianson
چکیده

A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encrypting the communication between the honest endpoints does not protect against such attacks. The main solution that has been o ered to date is distance bounding, in which a tightly timed exchange of challenges and responses persuades the veri er that the prover cannot be further away than a certain distance. This solution, however, still won't say whether the speci c endpoint the veri er is talking to is the intended one or not it will only tell the veri er whether the real prover is nearby . Are there any alternatives? We propose a more general paradigm based on multichannel protocols. Our class of protocols, of which distance bounding can be modelled as a special case, allows a precise answer to be given to the question of whether the unknown device in front of the potential victim is a relaying attacker or the device with which the victim intended to communicate. We discuss several instantiations of our solution and point out the extent to which all these countermeasures rely, often implicitly, on the alertness of a honest human taking part in the protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures

In IEEE 802.11 networks, selfish stations can pursue a better quality of service (QoS) through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Twohop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicabi...

متن کامل

RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since t...

متن کامل

Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)

In this paper we propose a new method to detect relay attacks. The relay attacks are possible in many communication systems, and are easy to put in practice since the attackers don’t require any knowledge about the underlying protocols or the cryptographic keys. So far the most practical solutions against relay attacks rely on distancebounding protocols. These protocols can provide an estimated...

متن کامل

Make noise and whisper: a solution to relay attacks

In this paper we propose a new method to detect relay attacks. The relay attacks are possible in many communication systems, and are easy to put in practice since the attackers don't require any knowledge about the underlying protocols or the cryptographic keys. So far the most practical solutions against relay attacks seem to rely on distance-bounding protocols. These protocols can provide an ...

متن کامل

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010