Filters








12 Hits in 2.2 sec

The Poulidor Distance-Bounding Protocol [chapter]

Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine
2010 Lecture Notes in Computer Science  
A countermeasure against these types of attacks are the well-known distance-bounding protocols.  ...  Since then, many distance-bounding protocols have been proposed to thwart these attacks. In 2005, Hancke and Kuhn [6] proposed the first distance-bounding protocol dedicated to RFID.  ...  The authors thank to Chong Hee Kim for his support in the computation of the adversary mafia fraud probability for the Kim and Avoine's protocol [7] , Tania Martin for her precious help, Pierre François  ... 
doi:10.1007/978-3-642-16822-2_19 fatcat:sbhc3xkdwbdgrnbliooycmwxvm

Comparing distance bounding protocols: A critical mission supported by decision theory

Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua
2015 Computer Communications  
The methodology allows for a multi-criteria comparison of distance bounding protocols, thereby identifying the most appropriate protocols once the context is provided.  ...  Distance bounding protocols are security countermeasures designed to thwart relay attacks.  ...  This behavior is likely to be due to the fact that the actual distance fraud resistance of the Poulidor protocol cannot be computed yet [33, 32] , but an upper-bound only.  ... 
doi:10.1016/j.comcom.2015.06.007 fatcat:nliomyu4mzar5jmpmeasighcvy

Optimality Results on the Security of Lookup-Based Protocols [chapter]

Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2017 Lecture Notes in Computer Science  
Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier.  ...  However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table.  ...  The class of layered protocols is not trivial, as it contains all lookup-based distance bounding protocols proposed to date, except for the Poulidor protocol [14] .  ... 
doi:10.1007/978-3-319-62024-4_10 fatcat:xxp7hh2io5cddjbp4hrxhl6ohy

RFID Distance Bounding Protocols with Mixed Challenges

Chong Hee Kim, Gildas Avoine
2011 IEEE Transactions on Wireless Communications  
Recently, distance bounding protocols measuring the round-trip times of messages exchanged between the reader and the tag have been designed to prevent this attack.  ...  In this article, we introduce new distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2) n bound and which only require little memory.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers of the IEEE Transactions on Wireless Communications for their comments and suggestions.  ... 
doi:10.1109/twc.2011.030411.101158 fatcat:7hm3o3kkmbfp5omzxk4sdqjtmu

Security of Distance-Bounding

Gildas Avoine, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan čapkun, Gerhard Hancke (+4 others)
2018 ACM Computing Surveys  
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity.  ...  This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features.  ...  Poulidor, the graph-based distance-bounding protocol (Algorithm 9) designed by Trujillo-Rasua, Martin, and Avoine [69] , uses specific node and edge dependencies in the tree of the AT protocol [7] -  ... 
doi:10.1145/3264628 fatcat:cn734ifv5fhczfjjviwexu7cti

Distance Bounding Facing Both Mafia and Distance Frauds

Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine
2014 IEEE Transactions on Wireless Communications  
To cope these security issues, distance-bounding protocols have been designed.  ...  This article introduces a noise-resilient distance-bounding protocol that resists to both mafia and distance frauds.  ...  In the case of AT and Poulidor, only an upper-bound of their resistance to distance fraud have been provided [16, 9] .  ... 
doi:10.1109/twc.2014.2323979 fatcat:75jym6uoc5fqjlium5pb34dczi

Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding [chapter]

Rolando Trujillo-Rasua
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Distance bounding (DB) emerged as a countermeasure to the so-called relay attack, which affects several technologies such as RFID, NFC, Bluetooth, and Ad-hoc networks.  ...  A prominent family of DB protocols are those based on graphs, which were introduced in 2010 to resist both mafia and distance frauds.  ...  The author thanks to Gildas Avoine, Sjouke Mauw, Juan Alberto Rodriguez-Velazquez, and Alejandro Estrada-Moreno for their invaluable comments and feedback.  ... 
doi:10.1007/978-3-319-11569-6_23 fatcat:l56v2jsjnje3zmiddwqek62cem

Distance-Bounding Protocols: Verification Without Time and Location

Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants.  ...  This allows us to verify the correctness of distance-bounding protocols with standard protocol verification tools.  ...  ACKNOWLEDGMENT This work was supported by the Luxembourg National Research Fund under the grants AFR-PhD-10188265 and C15-IS-10428112.  ... 
doi:10.1109/sp.2018.00001 dblp:conf/sp/MauwSTT18 fatcat:yb27nrpmpjgejosg47yedmp46a

Survey of Distance Bounding Protocols and Threats [chapter]

Agnès Brelurut, David Gerault, Pascal Lafourcade
2016 Lecture Notes in Computer Science  
In the last decades, several Distance Bounding (DB) protocols have been introduced to avoid such attacks.  ...  Before the existence of distance bounding protocols, in 1988, Desmedt identifies the terrorist fraud and mafia fraud [18]. Then, Avoine & Tchamkerten in 2009 [5] study the impersonation fraud.  ...  Definition 1 (Distance-Bounding Protocols [9] ). A Distance Bounding (DB) protocol is defined by a tuple (Gen, P, V, B), where: 1.  ... 
doi:10.1007/978-3-319-30303-1_3 fatcat:7jc4smro2rgr7opyvsbtep65j4

A Class of Precomputation-Based Distance-Bounding Protocols

Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2016 2016 IEEE European Symposium on Security and Privacy (EuroS&P)  
This can be achieved by precomputing the responses to the various possible challenges. In this paper we study this class of precomputation-based distance-bounding protocols.  ...  Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay attacks.  ...  Distance-bounding protocols Distance-bounding protocols are authentication protocols that, in addition, compute an upper bound on the distance between the two parties involved in the protocol.  ... 
doi:10.1109/eurosp.2016.19 dblp:conf/eurosp/MauwTT16 fatcat:djajny66crg3zmatc4dkof5udu

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Moreover, we present a novel distance-bounding protocol based on graphs that is extremely low-resource consuming.  ...  Some of them arise from the technology itself, such as distance checking, but others are related to the potential of RFID systems to gather huge amount of tracking data.  ...  The Poulidor Distance-bounding Protocol the one obtained from the prover.  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

Secure Neighbor Discovery and Ranging in Wireless Networks

Marcin Poturalski
2011
Ranging, or distance bounding, consists in measuring the distance between devices, or providing an upper bound on this distance.  ...  Thus, they can circumvent time-based neighbor discovery protocols and distance bounding protocols.  ...  Distance Bounding Distance bounding (DB) protocols allow one device, the verifier V, to securely compute an upper-bound on the distance to another device, the prover P.  ... 
doi:10.5075/epfl-thesis-5131 fatcat:i3gowp4nyjgrhpf6dtukknceki