So near and yet so far: Distance-bounding attacks in wireless networks

Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, Perrig and Johnson (2003), Sastry, Shankar and Wagner (2003), and Čapkun and Hubaux (2005, 2006) are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits. We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols. The attacker can exploit this to appear closer himself or to perform a relaying attack against other nodes. We describe attack strategies to achieve this, including optimizing the communication protocol stack, taking early decisions as to the value of received bits and modifying the waveform of transmitted bits. We consider applying distance-bounding protocols to constrained devices and evaluate existing proposals for distance bounding in ad hoc networks. © 2006 Springer-Verlag Berlin Heidelberg.
Original languageEnglish
Title of host publicationSecurity and Privacy in Ad-Hoc and Sensor Networks
Subtitle of host publicationThird European Workshop, ESAS 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages83-97
Volume4357 LNCS
ISBN (Print)9783540691723
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006 - Hamburg, Germany
Duration: 20 Sept 200621 Sept 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4357 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006
PlaceGermany
CityHamburg
Period20/09/0621/09/06

Fingerprint

Dive into the research topics of 'So near and yet so far: Distance-bounding attacks in wireless networks'. Together they form a unique fingerprint.

Cite this