Filters








703 Hits in 6.2 sec

Distance Bounding Facing Both Mafia and Distance Frauds

Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine
2014 IEEE Transactions on Wireless Communications  
This article introduces a noise-resilient distance-bounding protocol that resists to both mafia and distance frauds.  ...  Contactless technologies such as RFID, NFC, and sensor networks are vulnerable to mafia and distance frauds.  ...  However, none of the current DB protocols are lightweight and resistance to both mafia and distance frauds.  ... 
doi:10.1109/twc.2014.2323979 fatcat:75jym6uoc5fqjlium5pb34dczi

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [chapter]

Süleyman Kardaş, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci
2012 Lecture Notes in Computer Science  
., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks.  ...  Many RFID distance bounding protocols have been proposed recently, with encouraging results. However, none of them provides the ideal security against the terrorist fraud.  ...  The success probabilities against the mafia fraud and distance fraud are both equal to (3/4) n [13, 18] .  ... 
doi:10.1007/978-3-642-25286-0_6 fatcat:d7of7ql3rzbovmlkf4ku5cihby

A framework for analyzing RFID distance bounding protocols

Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardaş, Cédric Lauradoux, Benjamin Martin, Yingjiu Li, Jianying Zhou
2011 Journal of Computer Security  
From Authentication to Distance Bounding As a prelude to distance bounding, we consider two classes of protocols that are authentication and distance checking, both strongly related to our problem.  ...  Such a timeout is long-enough to carry out a mafia fraud over thousands kilometers. Distance bounding protocols.  ...  The authors thank to Jorge Munilla and Marc Vauclair for their interesting comments.  ... 
doi:10.3233/jcs-2010-0408 fatcat:fz272dd3ljcnhdwmqvzezjplhm

Security of Distance-Bounding

Gildas Avoine, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan čapkun, Gerhard Hancke (+4 others)
2018 ACM Computing Surveys  
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity.  ...  This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features.  ...  This analysis focuses on their protocol (Algorithm 1) that mitigates both mafia and distance fraud.  ... 
doi:10.1145/3264628 fatcat:cn734ifv5fhczfjjviwexu7cti

A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme

Yihang Song, Songfan Li, Chong Zhang, Li Lu, Kuo-Hui Yeh
2021 Security and Communication Networks  
Distance bounding protocols guarantee a credible distance upper bound between the devices which require the spatial distance as a security parameter to defend Mafia Fraud attacks.  ...  However, in RF systems, the realization of distance bounding protocol faces obstacles due to low spectrum efficiency, since the distance bound estimation consumes a significant amount of frequency band  ...  Background and Related Works Distance Bounding Protocol. e distance bounding protocol was firstly proposed [8] to prevent the Mafia Fraud attack on access control systems.  ... 
doi:10.1155/2021/6668498 fatcat:qi2agb66yjaxxgbyibmfuvmjxa

Breaking and fixing the HB+DB protocol

Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '17  
First, we show that HB+DB may be impractical as a secure distance-bounding protocol, as its distancefraud and mafia-fraud security-levels scale poorly compared to other distance-bounding protocols.  ...  In this paper, we exhibit flaws both in the authentication and distance-bounding layers of HB+DB; these vulnerabilities encompass practical attacks as well as provable security shortcomings.  ...  The false acceptance rate is a lower bound for the best distance-and mafia-fraud.  ... 
doi:10.1145/3098243.3098263 dblp:conf/wisec/BoureanuG0O17 fatcat:ie6gcjfi7ng2havps3dzmfo2fi

Challenges in Distance Bounding

Ioana Boureanu, Serge Vaudenay
2015 IEEE Security and Privacy  
In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations.  ...  Distance-bounding is in itself prone to some specific attacks. In a distance-fraud (DF), a prover tries to convince the verifier that he is closer than he really is.  ...  [15] proved in 2008 that many existing distance-bounding protocols are also subject to mafia-fraud.  ... 
doi:10.1109/msp.2015.2 fatcat:ep5xzktb45esrgbl7v7ify425i

Secure Distance Bounding Protocol On Ultra-Wideband Based Mapping Code

Jamel Miri, Bechir Nsiri, Ridha Bouallegue
2017 Zenodo  
In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud.  ...  To face these attacks, distance bounding protocols are the most popular counter measures.  ...  The proposed distance bounding protocol can resist to two attacks (Distance Fraud and Mafia Fraud), but not to terrorist fraud because the core of these protocols follows the principle of HK.  ... 
doi:10.5281/zenodo.1130517 fatcat:4kq4dhchiff35fzcrlcj2hm5lu

Secure Distance Bounding Protocol On Ultra-Wideband Based Mapping Code

Jamel Miri, Bechir Nsiri, Ridha Bouallegue
2017 Zenodo  
In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud.  ...  To face these attacks, distance bounding protocols are the most popular counter measures.  ...  The proposed distance bounding protocol can resist to two attacks (Distance Fraud and Mafia Fraud), but not to terrorist fraud because the core of these protocols follows the principle of HK.  ... 
doi:10.5281/zenodo.1340192 fatcat:eyjoftueijdo7exdeddauagr44

A secure distance-based RFID identification protocol with an off-line back-end database

Pedro Peris-Lopez, Agustin Orfila, Esther Palomar, Julio C. Hernandez-Castro
2011 Personal and Ubiquitous Computing  
The proposed protocol, called Noent, is based on cryptographic puzzles to avoid the indiscriminate disclose of the confidential information stored on tags and on an innovative role reversal distance bounding  ...  protocol to distinguish between honest and rogue readers.  ...  Bounding protocols (DBP) emerged as a countermeasure against mafia fraud.  ... 
doi:10.1007/s00779-011-0396-y fatcat:jrwpszpi6jhubj2qomy3mzeb7y

A new secure authentication based distance bounding protocol

Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan
2021 PeerJ Computer Science  
The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud).  ...  In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key.  ...  Relay attack (Mafia and Terrorist Fraud) 2. Impersonation Fraud 3. Distance Fraud and Hijacking Table 2 2 Proposed Protocol.  ... 
doi:10.7717/peerj-cs.517 pmid:34013037 pmcid:PMC8114813 fatcat:h4hwkjk7brcjhmnahenqie5yjq

The Swiss-Knife RFID Distance Bounding Protocol [chapter]

Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira
2009 Lecture Notes in Computer Science  
We also point out a weakness in Tu and Piramuthu's protocol, which was considered up to now as one of the most efficient distance bounding protocol.  ...  Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages.  ...  Finally, we provide a security and efficiency analysis. 2 Relay attacks and distance bounding protocols Relay attacks There are two types of relay attacks: mafia fraud attack and terrorist fraud attack  ... 
doi:10.1007/978-3-642-00730-9_7 fatcat:2zenheeylrfdrjxlk3t4g7nggu

Symbolic Analysis of Terrorist Fraud Resistance [chapter]

Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling
2019 Lecture Notes in Computer Science  
Distance-bounding protocols aim at preventing several kinds of attacks, amongst which terrorist fraud, where a far away malicious prover colludes with an attacker to authenticate once, without giving him  ...  As an application, we analyse several distance-bounding protocols, as well as some contactless payment protocols using the ProVerif tool.  ...  in various distance bounding protocols.  ... 
doi:10.1007/978-3-030-29959-0_19 fatcat:gdwrqir25nc3rkazjty532rmi4

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Moreover, we present a novel distance-bounding protocol based on graphs that is extremely low-resource consuming.  ...  Some of them arise from the technology itself, such as distance checking, but others are related to the potential of RFID systems to gather huge amount of tracking data.  ...  The Poulidor Distance-bounding Protocol This chapter describes a novel distance-bounding protocol resistant to both mafia and distance fraud.  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

Secure object identification

Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
2003 Proceedings of the 2003 workshop on New security paradigms - NSPW '03  
This attack is known as mafia fraud. The Probabilistic Channel Hopping (PCH) system we introduce in this paper, solves this problem by hiding the conversation channel between the participants.  ...  Brands and Chaum propose in [10] a solution they call distance-bounding.  ...  devices performing a mafia fraud.  ... 
doi:10.1145/986655.986668 dblp:conf/nspw/AlkassarSS03 fatcat:duecj5ogyfd2rgv47tpribili4
« Previous Showing results 1 — 15 out of 703 results