Options
Katerina Mitrokotsa
Title
Prof. Dr.
Last Name
Mitrokotsa
First name
Katerina
Email
katerina.mitrokotsa@unisg.ch
Phone
+41 71 224 7861
Homepage
Twitter
https://twitter.com/mitrokat
Now showing
1 - 3 of 3
-
PublicationTwo-hop Distance-Bounding Protocols: Keep your Friends Close.(IEEE, 2018-07-01)
;Yang, Anjia ;Pagnin, Elena ;Hancke, Gerhard P.Wong, Duncan S.Type: journal articleJournal: IEEE Transactions on Mobile ComputingVolume: 17Issue: 7Scopus© Citations 19 -
PublicationPractical & provably secure distance-bounding.From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding protocols. More precisely, we explicate a general formalism for distance-bounding protocols, which lead to this practical and provably secure class of protocols (and it could lead to others). We prove that SKI and its variants are provably secure, even under the real-life setting of noisy communications, against the main types of relay attacks: distance-fraud and generalised versions of mafia- and terrorist-fraud. To attain resistance to terrorist-fraud, we reinforce the idea of using secret sharing, combined with the new notion of a leakage scheme. In view of resistance to generalised mafia-frauds (and terrorist-frauds), we present the notion of circular-keying for pseudorandom functions (PRFs); this notion models the employment of a PRF, with possible linear reuse of the key. We also identify the need of PRF masking to fix common mistakes in existing security proofs/claims. Finally, we enhance our design to guarantee resistance to terrorist-fraud in the presence of noise.Type: journal articleJournal: Journal of Computer SecurityVolume: 23Issue: 2DOI: 10.3233/JCS-140518
Scopus© Citations 30 -
PublicationOn selecting the nonce length in distance-bounding protocols.(Oxford University Press, 2013-04-04)
;Peris-Lopez, Pedro ;Dimitrakakis, ChristosVaudenay, SergeDistance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of the attack under noisy conditions. Both of these show that the attack's success probability mainly depends on the length of the used nonces rather than the length of the shared secret key. The theoretical bound could be used by practitioners to appropriately select their security parameters. While longer nonces can guard against this type of attack, we provide a possible countermeasure which successfully combats these attacks even when short nonces are used.Type: journal articleJournal: The Computer JournalVolume: 56Issue: 10Scopus© Citations 14