Abstract
Distance bounding (DB) protocols allow one entity, the verifier, to securely obtain an upper-bound on the distance to another entity, the prover. Thus far, DB was considered mostly in the context of a single prover and a single verifier. There has been no substantial prior work on secure DB in group settings, where a set of provers interact with a set of verifiers. The need for group distance bounding (GDB) is motivated by many practical scenarios, including: group device pairing, location-based access control and secure distributed localization. This paper addresses, for the first time, one-way GDB protocols by utilizing a new passive DB primitive. We show how passive DB can be used to construct secure and efficient GDB protocols for various one-way GDB settings. We analyze the security and performance of proposed protocols and compare them with existing DB techniques extended to group settings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Multispectral Solutions Inc., Urban Positioning System (UPS), http://www.multispectral.com
RFC1677-Tactical Radio Frequency Communication Requirements for IPng, http://www.faqs.org/rfcs/rfc1677.html
Brands, S., Chaum, D.: Distance-bounding protocols. In: EUROCRYPT 1994 (1994)
Callaway, E., Gorday, P.: Home networking with ieee 802.15.4: a developing standard for low-rate wireless personal area networks. IEEE Communications Magazine (2002)
Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. In: IEEE INFOCOM (2005)
Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)
Chen, C., Chen, C., Kuo, C., Lai, Y., McCune, J., Studer, A., Perrig, A., Yang, B., Wu, T.: Gangs: gather, authenticate ’n group securely. In: ACM MobiCom (2008)
Chiang, J., Haas, J., Hu, Y.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: ACM WiSec (2009)
Cremers, C., Rasmussen, K., Capkun, S.: Distance hijacking attacks on distance bounding protocols. Cryptology ePrint Archive: Report 2011/129 (2011)
Drimer, S., Murdoch, S.: Keep your enemies close: distance bounding against smartcard relay attacks. In: USENIX Security Symposium (2007)
Gunnarsson, F.: Positioning using time-difference of arrival measurements. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2003)
Hancke, G., Kuhn, M.: An rfid distance bounding protocol. In: IEEE SECURECOMM (2005)
Rasmussen, K., ÄŒapkun, S.: Location privacy of distance bounding protocols. In: ACM CCS (2008)
Luecken, H., Kuhn, M., Tippenhauer, N.: UWB impulse radio based distance bounding. In: Workshop on Positioning, Navigation and Communication (WPNC) (2010)
Malpani, N., Welch, J., Vaidya, N.: Leader election algorithms for mobile ad hoc networks. In: ACM DIALM (2000)
Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: IEEE Securecomm (2006)
Rasmussen, K., ÄŒapkun, S.: Realization of rf distance bounding. In: USENIX Security Symposium (2010)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: ACM WiSe (2003)
Shmatikov, V., Wang, M.: Secure verification of location claims with simultaneous distance modification. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 181–195. Springer, Heidelberg (2007)
Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (2005)
Tippenhauer, N.O., Čapkun, S.: ID-based secure distance bounding and localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621–636. Springer, Heidelberg (2009)
Čapkun, S., Buttyán, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: ACM SASN (2003)
Young, D., Keller, C., Bliss, D., Forsythe, K.: Ultra-wideband (uwb) transmitter location using time difference of arrival (tdoa) techniques. In: Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Capkun, S., El Defrawy, K., Tsudik, G. (2011). Group Distance Bounding Protocols. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-21599-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21598-8
Online ISBN: 978-3-642-21599-5
eBook Packages: Computer ScienceComputer Science (R0)