Skip to main content

Group Distance Bounding Protocols

(Short Paper)

  • Conference paper
Trust and Trustworthy Computing (Trust 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6740))

Included in the following conference series:

Abstract

Distance bounding (DB) protocols allow one entity, the verifier, to securely obtain an upper-bound on the distance to another entity, the prover. Thus far, DB was considered mostly in the context of a single prover and a single verifier. There has been no substantial prior work on secure DB in group settings, where a set of provers interact with a set of verifiers. The need for group distance bounding (GDB) is motivated by many practical scenarios, including: group device pairing, location-based access control and secure distributed localization. This paper addresses, for the first time, one-way GDB protocols by utilizing a new passive DB primitive. We show how passive DB can be used to construct secure and efficient GDB protocols for various one-way GDB settings. We analyze the security and performance of proposed protocols and compare them with existing DB techniques extended to group settings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Multispectral Solutions Inc., Urban Positioning System (UPS), http://www.multispectral.com

  2. RFC1677-Tactical Radio Frequency Communication Requirements for IPng, http://www.faqs.org/rfcs/rfc1677.html

  3. Brands, S., Chaum, D.: Distance-bounding protocols. In: EUROCRYPT 1994 (1994)

    Google Scholar 

  4. Callaway, E., Gorday, P.: Home networking with ieee 802.15.4: a developing standard for low-rate wireless personal area networks. IEEE Communications Magazine (2002)

    Google Scholar 

  5. Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. In: IEEE INFOCOM (2005)

    Google Scholar 

  6. Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Chen, C., Chen, C., Kuo, C., Lai, Y., McCune, J., Studer, A., Perrig, A., Yang, B., Wu, T.: Gangs: gather, authenticate ’n group securely. In: ACM MobiCom (2008)

    Google Scholar 

  8. Chiang, J., Haas, J., Hu, Y.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: ACM WiSec (2009)

    Google Scholar 

  9. Cremers, C., Rasmussen, K., Capkun, S.: Distance hijacking attacks on distance bounding protocols. Cryptology ePrint Archive: Report 2011/129 (2011)

    Google Scholar 

  10. Drimer, S., Murdoch, S.: Keep your enemies close: distance bounding against smartcard relay attacks. In: USENIX Security Symposium (2007)

    Google Scholar 

  11. Gunnarsson, F.: Positioning using time-difference of arrival measurements. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2003)

    Google Scholar 

  12. Hancke, G., Kuhn, M.: An rfid distance bounding protocol. In: IEEE SECURECOMM (2005)

    Google Scholar 

  13. Rasmussen, K., ÄŒapkun, S.: Location privacy of distance bounding protocols. In: ACM CCS (2008)

    Google Scholar 

  14. Luecken, H., Kuhn, M., Tippenhauer, N.: UWB impulse radio based distance bounding. In: Workshop on Positioning, Navigation and Communication (WPNC) (2010)

    Google Scholar 

  15. Malpani, N., Welch, J., Vaidya, N.: Leader election algorithms for mobile ad hoc networks. In: ACM DIALM (2000)

    Google Scholar 

  16. Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: IEEE Securecomm (2006)

    Google Scholar 

  17. Rasmussen, K., ÄŒapkun, S.: Realization of rf distance bounding. In: USENIX Security Symposium (2010)

    Google Scholar 

  18. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: ACM WiSe (2003)

    Google Scholar 

  19. Shmatikov, V., Wang, M.: Secure verification of location claims with simultaneous distance modification. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 181–195. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  20. Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (2005)

    Google Scholar 

  21. Tippenhauer, N.O., ÄŒapkun, S.: ID-based secure distance bounding and localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621–636. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Čapkun, S., Buttyán, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: ACM SASN (2003)

    Google Scholar 

  23. Young, D., Keller, C., Bliss, D., Forsythe, K.: Ultra-wideband (uwb) transmitter location using time difference of arrival (tdoa) techniques. In: Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Capkun, S., El Defrawy, K., Tsudik, G. (2011). Group Distance Bounding Protocols. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21599-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21598-8

  • Online ISBN: 978-3-642-21599-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics