2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) 2012
DOI: 10.1109/rfid-ta.2012.6404571
|View full text |Cite
|
Sign up to set email alerts
|

Mafia fraud attack against the RČ Distance-Bounding Protocol

Abstract: Abstract-At ACM CCS 2008, Rasmussen andČapkun introduced a distance-bounding protocol [22] (henceforth RČ protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden marker) and receiving the response. Thus, the verifier is able to compute an upper bound on the distance separating it and the prover. Distance bounding protocols should resist to the most classical types of attacks such as distance fraud and mafia … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
24
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

5
2

Authors

Journals

citations
Cited by 14 publications
(25 citation statements)
references
References 17 publications
(28 reference statements)
1
24
0
Order By: Relevance
“…People already suggested to protect location privacy [33], but this suffers from severe limitations as shown in [1,27]. Anonymity could also be considered in a way similar to RFID protocols [37,32,23].…”
Section: Resultsmentioning
confidence: 99%
“…People already suggested to protect location privacy [33], but this suffers from severe limitations as shown in [1,27]. Anonymity could also be considered in a way similar to RFID protocols [37,32,23].…”
Section: Resultsmentioning
confidence: 99%
“…For [5,49,7,50,56,34,38,41,31,51,20], we mount new TF attacks. These attacks all follow the same scheme: the adversary is close to the verifier whereas the prover is far away.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Though the protocol in [26] claims to preserve location privacy, we note that location privacy has never been formalised in the literature. Additionally, the RČ protocol has been shown to be susceptible to a non-polynomial dictionary attack which may reveal the prover's and verifier's locations [1] as well as to a mafia fraud attack [24]. Mitrokotsa et al [24] have proposed a new distance bounding protocol called Location-Private Distance Bounding (LPDB) that improves the basic construction of the RČ protocol and renders it secure against the latter attack.…”
Section: Introductionmentioning
confidence: 99%