Download Now Free registration required
Distance-bounding protocols aim to prevent man-in-the-middle attacks by measuring response times. At ISC 2011, Durholz et al. formalized the four attacks such protocols typically address: mafia attacks, where the adversary must impersonate to a verifier in the presence of an honest prover, terrorist attacks, where the adversary gets limited offline support from the prover for the impersonation, distance fraud attacks, where provers claim to be closer to verifiers than they really are, and impersonation security, where adversaries try to impersonate the provers in lazy protocol phases.
- Format: PDF
- Size: 226.22 KB