نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

2008
Ventzislav Nikov Marc Vauclair

Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new protocols have been proposed the last five

2010
Kasper Bonne Rasmussen Srdjan Capkun

One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process ...

2007
Catherine Meadows Paul Syverson

A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distanc...

Journal: :Journal of the Korea Industrial Information Systems Research 2012

2012
Aanjhan Ranganathan Nils Ole Tippenhauer Boris Skoric Dave Singelée Srdjan Capkun

Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few designs have been proposed and implemented. Currently, the most efficient implementation of distance bounding protocols uses analog processing and enables the prover to receive a message, process it and transmit the reply within 1 ns...

Journal: :IACR Cryptology ePrint Archive 2012
Cristina Onete

Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; (2) terrorist fraud, where...

2008
Dave Singelée Bart Preneel

Distance bounding protocols can be employed in mutual entity authentication schemes to determine an upper bound on the distance to another entity. As these protocols are conducted over noisy wireless adhoc channels, they should be designed to cope well with substantial bit error rates during the rapid single bit exchanges. This paper investigates the robustness to high bit error rates of two im...

2006
Jolyon Clulow Gerhard P. Hancke Markus G. Kuhn Tyler Moore

Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, Perrig and Johnson (2003), Sastry, Shankar and Wagner (2003), and Čapkun and Hubaux (2005, 2006) are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a num...

2009
Nils Ole Tippenhauer Srdjan Capkun

In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure distance measurement as elemental building block, and enables the implementation of secure distance bounding using commercial off-the-shelf (COTS) ranging devices. We use the proposed protocol to implement secure radio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید