Open access
Date
2011Type
- Report
ETH Bibliography
yes
Altmetrics
Abstract
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using existing informal and formal frameworks does not guarantee the absence of Distance Hijacking attacks. Show more
Permanent link
https://doi.org/10.3929/ethz-a-006724670Publication status
publishedPublisher
Eidgenössische Technische Hochschule Zürich, [Department of Computer Science]Edition / version
Version 2.0, 24 August 2011Subject
Attacks; Position verification; DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); Multiprover environment; SPECIAL PROGRAMMING METHODS; Hijacking; Location verification; SPEZIELLE PROGRAMMIERMETHODEN; Distance bounding; DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)Organisational unit
02150 - Dep. Informatik / Dep. of Computer Science
Notes
Technical Reports D-INFK.More
Show all metadata
ETH Bibliography
yes
Altmetrics