TY - GEN
T1 - So near and yet so far
T2 - 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006
AU - Clulow, Jolyon
AU - Hancke, Gerhard P.
AU - Kuhn, Markus G.
AU - Moore, Tyler
PY - 2006
Y1 - 2006
N2 - Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, Perrig and Johnson (2003), Sastry, Shankar and Wagner (2003), and Čapkun and Hubaux (2005, 2006) are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits. We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols. The attacker can exploit this to appear closer himself or to perform a relaying attack against other nodes. We describe attack strategies to achieve this, including optimizing the communication protocol stack, taking early decisions as to the value of received bits and modifying the waveform of transmitted bits. We consider applying distance-bounding protocols to constrained devices and evaluate existing proposals for distance bounding in ad hoc networks. © 2006 Springer-Verlag Berlin Heidelberg.
AB - Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, Perrig and Johnson (2003), Sastry, Shankar and Wagner (2003), and Čapkun and Hubaux (2005, 2006) are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits. We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols. The attacker can exploit this to appear closer himself or to perform a relaying attack against other nodes. We describe attack strategies to achieve this, including optimizing the communication protocol stack, taking early decisions as to the value of received bits and modifying the waveform of transmitted bits. We consider applying distance-bounding protocols to constrained devices and evaluate existing proposals for distance bounding in ad hoc networks. © 2006 Springer-Verlag Berlin Heidelberg.
UR - http://www.scopus.com/inward/record.url?scp=84876367662&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84876367662&origin=recordpage
U2 - 10.1007/11964254_9
DO - 10.1007/11964254_9
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 9783540691723
VL - 4357 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 83
EP - 97
BT - Security and Privacy in Ad-Hoc and Sensor Networks
PB - Springer Verlag
Y2 - 20 September 2006 through 21 September 2006
ER -