Automatic analysis of distance bounding protocols

نویسندگان

  • Sreekanth Malladi
  • Bezawada Bruhadeshwar
  • Kishore Kothapalli
چکیده

Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. This typically involves sending a request by one node to another node, receiving a response, and then calculating an upper bound on the distance by multiplying the round-trip time with the velocity of the signal. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. Therefore, it is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed many times in the literature of key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols: We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the constraint solver tool so that it can be used to test protocols for violations of SDB in those scenarios and illustrate our technique on several examples that include new attacks on published protocols. We also hosted an on-line demo for the reader to check out our implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

متن کامل

Automatic Bounding Estimation in Modified Nlms Algorithm

Modified Normalized Least Mean Square (MNLMS) algorithm, which is a sign form of NLMS based on set-membership (SM) theory in the class of optimal bounding ellipsoid (OBE) algorithms, requires a priori knowledge of error bounds that is unknown in most applications. In a special but popular case of measurement noise, a simple algorithm has been proposed. With some simulation examples the performa...

متن کامل

Timed Analysis of RFID Distance Bounding Protocols

Modelling real time is fundamental to reason about pervasive systems. The formal analysis of some time sensitive security protocols, such as distance bounding protocols, could lead to a more formal approach to time dependent properties formalisation and verification of pervasive systems.

متن کامل

An RFID Unilateral Distance Bounding Protocol and Analysis Over a Noisy Channel

Abstract form of automatic identification systems used for humans and objects is radio frequency identification (RFID). Fast and almost error-free calculations have led to its wide application in many places. Distance Bounding (DB) protocols verify that the tag is within a certain distance form reader. This process can be done by measuring the round trip time for message exchange. These protoco...

متن کامل

Distance Hijacking Attacks on Distance Bounding Protocols – Abstract

Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on its distance to another device (the prover) [1]. A number of distance bounding protocols were proposed in recent years, which provide different performance and security guarantees. So far, several distance-bounding protocols were implemented, some using digital processing and short symbols, whereas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1003.5383  شماره 

صفحات  -

تاریخ انتشار 2009