Provably Secure Distance-Bounding: An Analysis of Prominent Protocols

Distance-bounding protocols aim to prevent man-in-the-middle attacks by measuring response times. At ISC 2011, Durholz et al. formalized the four attacks such protocols typically address: mafia attacks, where the adversary must impersonate to a verifier in the presence of an honest prover, terrorist attacks, where the adversary gets limited offline support from the prover for the impersonation, distance fraud attacks, where provers claim to be closer to verifiers than they really are, and impersonation security, where adversaries try to impersonate the provers in lazy protocol phases.

Provided by: Darmstadt University of Technology Topic: Security Date Added: Mar 2012 Format: PDF

Download Now

Find By Topic