Mobility

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

Free registration required

Executive Summary

Distance-bounding protocols address Man-In-The-Middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Durholz et al. formalize the following attacks against distance-bounding protocols: mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; terrorist fraud, where malicious provers help the adversary (in offline phases) to authenticate (however, the adversary shouldn't authenticate on its own); distance fraud, where a malicious prover must convince the verifier that it is closer to it than in reality; impersonation security, where the prover must authenticate to the verifier in the rounds where response times are not measured.

  • Format: PDF
  • Size: 388.32 KB