Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Mafia Fraud Attack against the RC Distance-Bounding Protocol
 
conference paper

Mafia Fraud Attack against the RC Distance-Bounding Protocol

Mitrokotsa, Aikaterini  
•
Onete, Cristina
•
Vaudenay, Serge  
2012
Proceedings of the IEEE International Conference on RFID-Technology and Applications 2012 (IEEE RFID T-A)
IEEE International Conference on RFID-Technology and Applications 2012 (IEEE RFID T-A))

At ACM~CCS 2008, Rasmussen and Capkun introduced a distance-bounding protocol RC07 (henceforth RC protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden marker) and receiving the response. Thus, the verifier is able to compute an upper bound on the distance separating it and the prover. Distance bounding protocols should resist to the most classical types of attacks such as distance fraud and mafia fraud. In mafia fraud, a man-in-the-middle adversary attempts to prove to a legitimate verifier that the prover is in the verifier's proximity, even though the prover is in reality far away and does not wish to run the protocol. The RC protocol was only claiming to resist distance fraud attacks. In this paper, we show a concrete mafia fraud attack against the RC protocol, which relies on replaying the prover nonce which was used in a previous session between a legitimate prover and the verifier. This attack has a large probability of success. We propose a new protocol called LPDB that is not vulnerable to the presented attack. It offers state-of-the-art security in addition to the notion of location privacy achieved by the RC protocol.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1109/RFID-TA.2012.6404571
Web of Science ID

WOS:000315438100014

Author(s)
Mitrokotsa, Aikaterini  
Onete, Cristina
Vaudenay, Serge  
Date Issued

2012

Publisher

IEEE

Publisher place

New York

Published in
Proceedings of the IEEE International Conference on RFID-Technology and Applications 2012 (IEEE RFID T-A)
ISBN of the book

978-1-4673-4656-6

Total of pages

6

Subjects

Distance bounding

•

relay attacks

•

mafia fraud

Editorial or Peer reviewed

NON-REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
IEEE International Conference on RFID-Technology and Applications 2012 (IEEE RFID T-A))

Nice, France

November 5-7, 2012

Available on Infoscience
September 27, 2012
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/85775
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés