Realization of RF Distance Bounding. Rasmussen, K., B. & Čapkun, S. In Proceedings of the USENIX Security Symposium (USENIX Security'10), pages 25, 2010.
Website abstract bibtex One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process and transmit signals in less than 1ns. The security guarantee that a distance bounding protocol built on top of this system therefore provides is that a malicious prover can, at most, pretend to be about 15cm closer to the verifier than it really is. To enable such fast processing at the prover, we use specially implemented concatenation as the prover's processing function and show how it can be integrated into a distance bounding protocol. Finally, we show that functions such as XOR and the comparison function, that were used in a number of previously proposed distance bounding protocols, are not best suited for the implementation of radio distance bounding.
@inProceedings{
title = {Realization of RF Distance Bounding},
type = {inProceedings},
year = {2010},
keywords = {fixnot-doi,fixnot-pages,protocol,proximity,summarized,wireless},
pages = {25},
websites = {http://www.usenix.org/events/sec10/tech/full_papers/Rasmussen.pdf},
id = {b98a5870-ff63-31d9-93b5-f54e27d4b74c},
created = {2018-07-12T21:31:55.687Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:55.687Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {rasmussen:distance10},
source_type = {inproceedings},
private_publication = {false},
abstract = {One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process and transmit signals in less than 1ns. The security guarantee that a distance bounding protocol built on top of this system therefore provides is that a malicious prover can, at most, pretend to be about 15cm closer to the verifier than it really is. To enable such fast processing at the prover, we use specially implemented concatenation as the prover's processing function and show how it can be integrated into a distance bounding protocol. Finally, we show that functions such as XOR and the comparison function, that were used in a number of previously proposed distance bounding protocols, are not best suited for the implementation of radio distance bounding.},
bibtype = {inProceedings},
author = {Rasmussen, Kasper B and Čapkun, Srdjan},
booktitle = {Proceedings of the USENIX Security Symposium (USENIX Security'10)}
}
Downloads: 0
{"_id":"smKxzCW8obcfeHEhn","bibbaseid":"rasmussen-apkun-realizationofrfdistancebounding-2010","downloads":0,"creationDate":"2019-02-15T15:15:00.280Z","title":"Realization of RF Distance Bounding","author_short":["Rasmussen, K., B.","Čapkun, S."],"year":2010,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"Realization of RF Distance Bounding","type":"inProceedings","year":"2010","keywords":"fixnot-doi,fixnot-pages,protocol,proximity,summarized,wireless","pages":"25","websites":"http://www.usenix.org/events/sec10/tech/full_papers/Rasmussen.pdf","id":"b98a5870-ff63-31d9-93b5-f54e27d4b74c","created":"2018-07-12T21:31:55.687Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:55.687Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"rasmussen:distance10","source_type":"inproceedings","private_publication":false,"abstract":"One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process and transmit signals in less than 1ns. The security guarantee that a distance bounding protocol built on top of this system therefore provides is that a malicious prover can, at most, pretend to be about 15cm closer to the verifier than it really is. To enable such fast processing at the prover, we use specially implemented concatenation as the prover's processing function and show how it can be integrated into a distance bounding protocol. Finally, we show that functions such as XOR and the comparison function, that were used in a number of previously proposed distance bounding protocols, are not best suited for the implementation of radio distance bounding.","bibtype":"inProceedings","author":"Rasmussen, Kasper B and Čapkun, Srdjan","booktitle":"Proceedings of the USENIX Security Symposium (USENIX Security'10)","bibtex":"@inProceedings{\n title = {Realization of RF Distance Bounding},\n type = {inProceedings},\n year = {2010},\n keywords = {fixnot-doi,fixnot-pages,protocol,proximity,summarized,wireless},\n pages = {25},\n websites = {http://www.usenix.org/events/sec10/tech/full_papers/Rasmussen.pdf},\n id = {b98a5870-ff63-31d9-93b5-f54e27d4b74c},\n created = {2018-07-12T21:31:55.687Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:55.687Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {rasmussen:distance10},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that these protocols require. Our system implements a prover that is able to receive, process and transmit signals in less than 1ns. The security guarantee that a distance bounding protocol built on top of this system therefore provides is that a malicious prover can, at most, pretend to be about 15cm closer to the verifier than it really is. To enable such fast processing at the prover, we use specially implemented concatenation as the prover's processing function and show how it can be integrated into a distance bounding protocol. Finally, we show that functions such as XOR and the comparison function, that were used in a number of previously proposed distance bounding protocols, are not best suited for the implementation of radio distance bounding.},\n bibtype = {inProceedings},\n author = {Rasmussen, Kasper B and Čapkun, Srdjan},\n booktitle = {Proceedings of the USENIX Security Symposium (USENIX Security'10)}\n}","author_short":["Rasmussen, K., B.","Čapkun, S."],"urls":{"Website":"http://www.usenix.org/events/sec10/tech/full_papers/Rasmussen.pdf"},"bibbaseid":"rasmussen-apkun-realizationofrfdistancebounding-2010","role":"author","keyword":["fixnot-doi","fixnot-pages","protocol","proximity","summarized","wireless"],"downloads":0},"search_terms":["realization","distance","bounding","rasmussen","čapkun"],"keywords":["fixnot-doi","fixnot-pages","protocol","proximity","summarized","wireless"],"authorIDs":[]}