skip to main content
10.1145/2462096.2462128acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Subtle kinks in distance-bounding: an analysis of prominent protocols

Published: 17 April 2013 Publication History

Abstract

Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. The four attacks such protocols typically address, recently formalized in [10], are: (1) mafia fraud, where the adversary must impersonate to a verifier in the presence of an honest prover; (2) terrorist fraud, where the adversary gets some offline prover support to impersonate; (3) distance fraud, where provers claim to be closer to verifiers than they really are; and (4) impersonations, where adversaries impersonate provers during lazy phases. Durholz et al. [10] also formally analyzed the security of (an enhancement of) the Kim-Avoine protocol [14].
In this paper we quantify the security of the following well-known distance-bounding protocols: Hancke and Kuhn [13], Reid et al. [16], the Swiss-Knife protocol [15], and the very recent proposal of Yang et al. [17]. Concretely, our main results show that (1) the usual terrorist-fraud countermeasure of relating responses to a long-term secret key may enable socalled key-learning mafia fraud attacks, where the adversary flips a single time-critical response to learn a key bit-by-bit; (2) though relating responses may allow mafia fraud, it sometimes enforces distance-fraud resistance by thwarting the attack of Boureanu et al. [5]; (3) none of the three allegedly terrorist-fraud resistant protocols, i.e. [15, 16, 17], is in fact terrorist fraud resistant; for the former two schemes this is a matter of syntax, attacks exploiting the strong formalization of [10]; the attack against the latter protocol of [17], however, is almost trivial; (4) unless key-update is done regardless of protocol completion, the protocol of Yang et al. is vulnerable to Denial-of-Service attacks. In light of our results, we also review definitions of terrorist fraud, arguing that, while the strong model in [10] may be at the moment more appropriate than mere intuition, it could be too strong to capture terrorist attacks.

References

[1]
M. R. S. Abyneh. Security analysis of two distance-bounding protocols. In Proceedings of RFIDSec 2011, volume 7055 of Lecture Notes in Computer Science, pages 94--107. Springer, 2011.
[2]
G. Avoine, M. A. Bingol, S. Karda, C. Lauradoux, and B. Martin. A formal framework for cryptanalyzing RFID distance bounding protocols. http://eprint.iacr.org/2009/543.pdf, 2009.
[3]
G. Avoine, C. Lauradoux, and B. Martin. How secret-sharing can defeat terrorist fraud. In Proceedings of the Fourth ACM Conference on Wireless Network Security WISEC 2011, pages 145--156. ACM Press, 2011.
[4]
G. Avoine and A. Tchamkerten. An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 250--261. Springer-Verlag, 2009.
[5]
I. Boureanu, A. Mitrokotsa, and S. Vaudenay. On the pseudorandom function assumption in (secure) distance-bounding protocols, 2012.
[6]
S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology | Eurocrypt'93, Lecture Notes in Computer Science, pages 344--359. Springer-Verlag, 1993.
[7]
P. H. Cole and D. C. Ranasinghe. Networked RFID Systems and Lightweight Cryptography. Springer-Verlag, 2008.
[8]
C. Cremers, K. B. Rasmussen, and S. Capkun. Distance hijacking attacks on distance bounding protocols. pages 113--127. IEEE Computer Society Press, 2012.
[9]
Y. Desmedt. Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SecuriCom, pages 15--17. SEDEP Paris, France, 1988.
[10]
U. Durholz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance bounding RFID protocols. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 47--62. Springer-Verlag, 2011.
[11]
Editors, Y. Zhang, and P. Kitsos. Security in RFID and Sensor Networks. CRC Press, 2009.
[12]
T. H-Security. Chip-based ID cards pose security risk at airports. http://www.h-online.com/security/news/item/Chip-based-ID-cards-pose-security-risk-at-airports-905662.html, 2010.
[13]
G. P. Hancke and M. G. Kuhn. An rfid distance bounding protocol. In SECURECOMM, pages 67--73. ACM Press, 2005.
[14]
C. H. Kim and G. Avoine. Rfid distance bounding protocol with mixed challenges to prevent relay attacks. In Proceedings of the 8th International Conference on Cryptology and Networks Security (CANS 2009), volume 5888 of Lecture Notes in Computer Science, pages 119--131. Springer-Verlag, 2009.
[15]
C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 98--115. Springer-Verlag, 2009.
[16]
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting relay attacks with timing-based protocols. In ASIACCS, pages 204--213. ACM Press, 2007.
[17]
A. Yang, Y. Zhuang, and D. S. Wong. An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance-Bounding Protocol with Tag Privacy. In Information and Communications Security, volume 7618 of Lecture Notes in Computer Science, pages 285--292. Springer-Verlag, 2012.

Cited By

View all
  • (2022)ICRP: Internet-Friendly Cryptographic Relay-Detection ProtocolCryptography10.3390/cryptography60400526:4(52)Online publication date: 17-Oct-2022
  • (2019)SEPD: An Access Control Model for Resource Sharing in an IoT EnvironmentComputer Security – ESORICS 201910.1007/978-3-030-29962-0_10(195-216)Online publication date: 15-Sep-2019
  • (2018)Security of Distance-BoundingACM Computing Surveys10.1145/326462851:5(1-33)Online publication date: 25-Sep-2018
  • Show More Cited By

Index Terms

  1. Subtle kinks in distance-bounding: an analysis of prominent protocols

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
      April 2013
      230 pages
      ISBN:9781450319980
      DOI:10.1145/2462096
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 April 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cryptography
      2. distance-bounding
      3. protocol analysis
      4. provable security

      Qualifiers

      • Research-article

      Conference

      WISEC'13
      Sponsor:

      Acceptance Rates

      WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)ICRP: Internet-Friendly Cryptographic Relay-Detection ProtocolCryptography10.3390/cryptography60400526:4(52)Online publication date: 17-Oct-2022
      • (2019)SEPD: An Access Control Model for Resource Sharing in an IoT EnvironmentComputer Security – ESORICS 201910.1007/978-3-030-29962-0_10(195-216)Online publication date: 15-Sep-2019
      • (2018)Security of Distance-BoundingACM Computing Surveys10.1145/326462851:5(1-33)Online publication date: 25-Sep-2018
      • (2016)A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding ProtocolProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2939919(121-133)Online publication date: 18-Jul-2016
      • (2016)Distance Bounding Based on PUFCryptology and Network Security10.1007/978-3-319-48965-0_48(701-710)Online publication date: 28-Oct-2016
      • (2015)Practical and provably secure distance-boundingJournal of Computer Security10.3233/JCS-14051823:2(229-257)Online publication date: 3-Jun-2015
      • (2015)Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions2015 International Conference and Workshops on Networked Systems (NetSys)10.1109/NetSys.2015.7089068(1-8)Online publication date: Mar-2015
      • (2015)Distance-Bounding Protocols: Are You Close Enough?IEEE Security & Privacy10.1109/MSP.2015.8713:4(47-51)Online publication date: Jul-2015
      • (2015)Challenges in Distance BoundingIEEE Security & Privacy10.1109/MSP.2015.213:1(41-48)Online publication date: Jan-2015
      • (2015)The Not-so-Distant FutureRevised Selected Papers of the 14th International Conference on Smart Card Research and Advanced Applications - Volume 951410.1007/978-3-319-31271-2_13(209-224)Online publication date: 4-Nov-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media