Distance Hijacking Attacks on Distance Bounding Protocols

Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. The authors define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. They show that many proposed distance bounding protocols are vulnerable to these attacks, and they propose solutions to make these protocols resilient to Distance Hijacking. Additionally, they generalize Distance Hijacking to Location Hijacking, to which location verification protocols may be vulnerable.

Provided by: ETH Zurich Topic: Security Date Added: Mar 2011 Format: PDF

Find By Topic