Distance-bounding protocols are able to measure a secure upper bound to the distance between two devices. They are designed to resist to reduction attacks, whose objective is reducing the measured distance. In this paper we focus on the opposite problem, the enlargement attack, which is aimed at enlarging the measured distance. We analyze the feasibility of enlargement attacks through overshadow strategies on 802.15.4a UWB distance-bounding protocols. We show that the overshadow strategies, generally considered feasible by the existing literature, are actually difficult to carry out. Depending on the delay introduced by the adversary, there are cases in which they have no effect or their effect is not controllable.

On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding

TAPONECCO, LORENZO;PERAZZO, PERICLE;D'AMICO, ANTONIO ALBERTO;DINI, GIANLUCA
2014-01-01

Abstract

Distance-bounding protocols are able to measure a secure upper bound to the distance between two devices. They are designed to resist to reduction attacks, whose objective is reducing the measured distance. In this paper we focus on the opposite problem, the enlargement attack, which is aimed at enlarging the measured distance. We analyze the feasibility of enlargement attacks through overshadow strategies on 802.15.4a UWB distance-bounding protocols. We show that the overshadow strategies, generally considered feasible by the existing literature, are actually difficult to carry out. Depending on the delay introduced by the adversary, there are cases in which they have no effect or their effect is not controllable.
2014
Taponecco, Lorenzo; Perazzo, Pericle; D'Amico, ANTONIO ALBERTO; Dini, Gianluca
File in questo prodotto:
File Dimensione Formato  
2013_ieee_comm_lett_accepted.pdf

accesso aperto

Tipologia: Documento in Post-print
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 307.91 kB
Formato Adobe PDF
307.91 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/313867
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 11
social impact