Distance-bounding protocols are able to measure a secure upper bound to the distance between two devices. They are designed to resist to reduction attacks, whose objective is reducing the measured distance. In this paper we focus on the opposite problem, the enlargement attack, which is aimed at enlarging the measured distance. We analyze the feasibility of enlargement attacks through overshadow strategies on 802.15.4a UWB distance-bounding protocols. We show that the overshadow strategies, generally considered feasible by the existing literature, are actually difficult to carry out. Depending on the delay introduced by the adversary, there are cases in which they have no effect or their effect is not controllable.

On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding

TAPONECCO, LORENZO;PERAZZO, PERICLE;D'AMICO, ANTONIO ALBERTO;DINI, GIANLUCA
2014-01-01

Abstract

Distance-bounding protocols are able to measure a secure upper bound to the distance between two devices. They are designed to resist to reduction attacks, whose objective is reducing the measured distance. In this paper we focus on the opposite problem, the enlargement attack, which is aimed at enlarging the measured distance. We analyze the feasibility of enlargement attacks through overshadow strategies on 802.15.4a UWB distance-bounding protocols. We show that the overshadow strategies, generally considered feasible by the existing literature, are actually difficult to carry out. Depending on the delay introduced by the adversary, there are cases in which they have no effect or their effect is not controllable.
2014
Taponecco, Lorenzo; Perazzo, Pericle; D'Amico, ANTONIO ALBERTO; Dini, Gianluca
File in questo prodotto:
File Dimensione Formato  
2014 - On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.pdf

accesso aperto

Tipologia: Documento in Post-print
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 269.55 kB
Formato Adobe PDF
269.55 kB Adobe PDF Visualizza/Apri
2014 - On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding - 2-s2.0-84900619015.pdf

solo utenti autorizzati

Tipologia: Versione finale editoriale
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 320 kB
Formato Adobe PDF
320 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/313867
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 16
  • ???jsp.display-item.citation.isi??? 12
social impact