2012
DOI: 10.1007/978-3-642-33167-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System

Abstract: Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few designs have been proposed and implemented. Currently, the most efficient implementation of distance bounding protocols uses analog processing and enables the prover to receive a message, process it and transmit the reply within 1 ns, two orders of magnitude faster than the most efficient digital implementation. However, even if implementing distanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 23 publications
(30 reference statements)
0
15
0
Order By: Relevance
“…The prover needs to attest to the verifier that it is closer than a certain maximum distance. In recent years, a number of such distance bounding protocols have been proposed [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…The prover needs to attest to the verifier that it is closer than a certain maximum distance. In recent years, a number of such distance bounding protocols have been proposed [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…This approach does not introduce any delay in the time-critical rapid-bit exchange phase, while still allows the prover to prove knowledge of the challenge bits in the last protocol phase. However, Ranganathan et al found that the CRCS implementation is vulnerable to a double read-out attack, which allows an adversary to obtain the values of the prover's two registers simultaneously [6]. Ranganathan et al proposed an hybrid solution -which they call Switched Challenge Reflector with Carrier Shifting (SCRCS) -that prevents the double read-out attack by introducing a new digital component that disables part of the analog circuitry after detecting the challenge [6].…”
Section: Related Workmentioning
confidence: 99%
“…However, Ranganathan et al found that the CRCS implementation is vulnerable to a double read-out attack, which allows an adversary to obtain the values of the prover's two registers simultaneously [6]. Ranganathan et al proposed an hybrid solution -which they call Switched Challenge Reflector with Carrier Shifting (SCRCS) -that prevents the double read-out attack by introducing a new digital component that disables part of the analog circuitry after detecting the challenge [6]. However, both the analog and hybrid approaches require complex hardware and storage at the prover.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Protocols with claimed security against terrorist fraud include [1,23,26,29]. These protocols used different approaches to provide this security.…”
Section: Practical Considerationmentioning
confidence: 99%