Distance Hijacking Attacks on Distance Bounding Protocols

Free registration required

Executive Summary

Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. The authors define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. They show that many proposed distance bounding protocols are vulnerable to these attacks, and they propose solutions to make these protocols resilient to Distance Hijacking. Additionally, they generalize Distance Hijacking to Location Hijacking, to which location verification protocols may be vulnerable.

  • Format: PDF
  • Size: 251.7 KB