skip to main content
10.1145/1229285.1229314acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Detecting relay attacks with timing-based protocols

Published:20 March 2007Publication History

ABSTRACT

Distance-bounding protocols have been proposed as a means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance-bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Distance-bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication that ultra wide band (UWB) radio is necessary to achieve a useful distance-bounding resolution for RF security devices (contactless smart cards, RFID tags and the like). We analyse this assertion and present an alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments.

References

  1. D. Ballo. Measuring absolute group delay of multistage converters. In Proceedings of 33rd European Microwave Conference, volume 1, pages 89--92. IEEE, 2003.]]Google ScholarGoogle Scholar
  2. S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology EUROCRYPT'93, LNCS 765, pages 344--359. Springer-Verlag, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Bussard. Trust Establishment Protocols for Communicating Devices. PhD thesis, Institut Eurécom, Télécom, Paris, 2004.]]Google ScholarGoogle Scholar
  4. S. Capkun, L. Buttyan, and J.-P. Hubaux. Sector: secure tracking of node encounters in multi-hop wireless networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 21--32, New York, NY, USA, 2003. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Desmedt. Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SecuriCom '88, pages 15--17, SEDEP Paris, France, 1988.]]Google ScholarGoogle Scholar
  6. Y. Dodis, R. Genaro, J. H. stad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, cascade and HMAC modes. In Advances in Cryptology CRYPT0 2004, LNCS 3152, pages 344--359. Springer-Verlag, 2004.]]Google ScholarGoogle Scholar
  7. K. Finkenzeller. RFID Handbook. John Wiley and Sons, Hoboken, NJ, 2nd edition, 2003.]]Google ScholarGoogle Scholar
  8. L. Francis, W. G. Sirett, K. Mayes, and K. Markantonakis. Countermeasures for attacks on satellite TV cards using open receivers. In CRPIT '44: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, pages 153--158, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. Hancke. A practical relay attack on ISO 14443 proximity cards. Manuscript, February 2005. Available at http://www.cl.cam.ac.uk/gh275/relay.pdf accessed October 2005.]]Google ScholarGoogle Scholar
  10. G. Hancke and M. Kuhn. An RFID distance bounding protocol. In Proceedings of the IEEE, SecureComm 2005, September 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Infineon. Device and method for supplying a data transfer unit with energy. US Patent Application 20050252972, 17 November 2005.]]Google ScholarGoogle Scholar
  12. ISO/IEC. 14443 Identification cards-contactless integrated circuit(s) cards-proximity cards. International Organisation for Standardisation, Geneva, 2001.]]Google ScholarGoogle Scholar
  13. A. Jones and J. McManus. The measurement of group delay using a microwave system analyser. Microwave Journal, 43(8):106--113, 2000.]]Google ScholarGoogle Scholar
  14. Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contactless smartcard systems. In Proceedings of the IEEE, SecureComm 2005, September 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology CRYPTO 99, page pages 388397, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security, pages 1--10, New York, NY, USA, 2003. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Singelee and B. Preneel. Location verification using secure distance bounding protocols. In Proceedings of Second IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'05). IEEE Computer Society, 2005.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Detecting relay attacks with timing-based protocols

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
                  March 2007
                  323 pages
                  ISBN:1595935746
                  DOI:10.1145/1229285

                  Copyright © 2007 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 20 March 2007

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  ASIACCS '07 Paper Acceptance Rate33of180submissions,18%Overall Acceptance Rate418of2,322submissions,18%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader