A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Distance Hijacking Attacks on Distance Bounding Protocols
2012
2012 IEEE Symposium on Security and Privacy
After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are historically known as Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. This type of attack poses a serious threat in many practical scenarios. We
doi:10.1109/sp.2012.17
dblp:conf/sp/CremersRSC12
fatcat:3knlkfskkndzrozn4lgzgf5lx4