Options
Two-hop Distance-Bounding Protocols: Keep your Friends Close.
Journal
IEEE Transactions on Mobile Computing
ISSN
1536-1233
ISSN-Digital
1558-0660
Type
journal article
Date Issued
2018-07-01
Author(s)
Abstract (De)
Authentication in wireless communications often depends on the physical proximity to a location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are based on the round-trip-time of challenge-response exchanges and can be employed to guarantee physical proximity and combat relay attacks. However, traditional DB protocols rely on the assumption that the prover (e.g., user) is in the communication range of the verifier (e.g., access point); something that might not be the case in multiple access control scenarios in ubiquitous computing environments as well as when we need to verify the proximity of our two-hop neighbour in an ad-hoc network. In this paper, we extend traditional DB protocols to a two-hop setting, i.e., when the prover is out of the communication range of the verifier and thus, they both need to rely on an untrusted in-between entity in order to verify proximity. We present a formal framework that captures the most representative classes of existing DB protocols and provide a general method to extend traditional DB protocols to the two-hop case (three participants). We analyze the security of two-hop DB protocols and identify connections with the security issues of the corresponding one-hop case. Finally, we demonstrate the correctness of our security analysis and the efficiency of our model by transforming five existing DB protocols to the two-hop setting and we evaluate their performance with simulated experiments.
Language
English
Keywords
Distance-bounding
relay attacks
authentication.
HSG Classification
contribution to scientific community
Refereed
Yes
Publisher
IEEE
Volume
17
Number
7
Start page
1723
End page
1736
Pages
14
Official URL
Subject(s)
Division(s)
Eprints ID
262925
File(s)