### Distance Hijacking Attacks on Distance Bounding Protocols

Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, and Srdjan Capkun

##### Abstract

After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are historically known as Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. This type of attack poses a serious threat in many practical scenarios. We show that many proposed distance bounding protocols are vulnerable to Distance Hijacking, and we propose solutions to make these protocols resilient to this type of attack. We show that verifying distance bounding protocols using existing informal and formal frameworks does not guarantee the absence of Distance Hijacking attacks. We extend a formal framework for reasoning about distance bounding protocols to include overshadowing attacks. We use the resulting framework to prove the absence of all of the found attacks for protocols to which our countermeasures have been applied. Previous proposals for distance bounding protocols only analysed their protocols with respect to some specific attack types, whose relations and problem coverage are unknown. To improve this situation, we define an exhaustive classification for attacks on distance bounding protocols.

Available format(s)
Category
Applications
Publication info
Published elsewhere. This is the full version of the IEEE S&P 2012 paper.
Keywords
Distance boundinglocation verificationposition verificationattackshijackingmulti-prover environment
Contact author(s)
cas cremers @ inf ethz ch
History
2012-08-29: last of 3 revisions
See all versions
Short URL
https://ia.cr/2011/129

CC BY

BibTeX

@misc{cryptoeprint:2011/129,
author = {Cas Cremers and Kasper B.  Rasmussen and Benedikt Schmidt and Srdjan Capkun},
title = {Distance Hijacking Attacks on Distance Bounding Protocols},
howpublished = {Cryptology ePrint Archive, Paper 2011/129},
year = {2011},
note = {\url{https://eprint.iacr.org/2011/129}},
url = {https://eprint.iacr.org/2011/129}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.