Opinion: Distance Bounding Under Diferent Assumptions
David Gerault
david@gerault.net
Nanyang Technological University, Singapore
Ioana Boureanu
i.boureanu@surrey.ac.uk
University of Surrey, UK
ABSTRACT
Distance-bounding protocols were introduced in 1993 as a coun-
termeasure to relay attacks, in which an adversary fraudulently
forwards the communication between a verifer and a distant prover.
In the more than 40 diferent protocols that followed, assumptions
were taken on the structure of distance-bounding protocols and
their threat models. In this paper, we survey works disrupting these
assumptions, and discuss the remaining challenges.
CCS CONCEPTS
· Security and privacy → Authentication; Security protocols;
Formal security models; Cryptanalysis and other attacks; · Net-
works → Mobile and wireless security.
ACM Reference Format:
David Gerault and Ioana Boureanu. 2019. Opinion: Distance Bounding Under
Diferent Assumptions. In 12th ACM Conference on Security and Privacy in
Wireless and Mobile Networks (WiSec ’19), May 15ś17, 2019, Miami, FL, USA.
ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3317549.3319729
1 INTRODUCTION
In relay attacks, an adversary forwards back and forth the commu-
nications between a a verifer (e.g., an RFID reader) and a prover
(e.g., an RFID card) found outside the verifer’s range; the adversary
does this in a fraudulent manner, in order to gain illicit access to
a service. Distance-bounding (DB) protocols were introduced by
Brands and Chaum in 1993 to counteract relay attacks. In these
protocols a verifer measures the round-trip times (RTTs) of its
exchanges with a prover, to estimate the distance between the two;
if the RTTs are greater than a certain threshold, then relay attacks
are probable and the verifer rejects the transaction. Relay attacks
against contactless payments [36] triggered Mastercard to add relay
protection through distance bounding [20]; so, after 25 years of
research, distance bounding is fnally adopted by the industry.
The threats [4] considered in łacademicž distance bounding are:
Mafa Fraud (MF). Two collaborating adversaries impersonate a
distant prover in front of a verifer. Typically, one of the adversaries
presents a fake verifer to the victim prover, while the other presents
a fake prover to the legitimate verifer.
Distance Fraud (DF). A distant dishonest prover authenticates
from afar by misleading the verifer in its measurements.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for proft or commercial advantage and that copies bear this notice and the full citation
on the frst page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specifc permission
and/or a fee. Request permissions from permissions@acm.org.
WiSec ’19, May 15ś17, 2019, Miami, FL, USA
© 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ACM ISBN 978-1-4503-6726-4/19/05. . . $15.00
https://doi.org/10.1145/3317549.3319729
Distance Hijacking (DH). Distance hijacking is a generalisa-
tion of distance fraud; in a DF, no prover is close to the verifer,
whereas in a DH, honest provers are to be found close to the verifer.
Terrorist Fraud (TF). A distant prover, helped by an accomplice
located close to the verifer, tries to authenticate. To exclude trivial
attacks where the prover gives his secret key to his accomplice,
the fraud is considered successful only if the accomplice cannot
authenticate on his own, once the prover no longer helps him.
A wide range of variations of these attacks have appeared, e.g.,
see [14]. Indeed, the threat model for DB is in constant evolu-
tion [23], and new attacks appear regularly: [4, 11] present more
than 40 protocols, most of which are vulnerable to at least one at-
tack. In particular, the notion of terrorist fraud and how to provably
resist it lead to numerous publications, e.g., [5, 21, 24, 39].
Contributions.
1. We critically survey works that, in a quest for better results, have
challenged the well-established assumptions in distance-bounding.
2. We discuss what could be achieved by lifting more assumptions.
2 DISRUPTING CLASSICAL ASSUMPTIONS
The main assumptions for academic distance-bounding protocols
were introduced in [10] and further extended in [15]. They are
mostly related to physical-layer constraints to obtain reliable time
measurements. Following these assumptions, most protocols are
divided in two: a). a phase which is not time-critical and bares
hardly any restrictions; b) a timed phase, in which 1-bit messages are
exchanged and no expensive computation can be is performed. This
section surveys approaches that bypass traditional assumptions.
Assumption 1: Single-bit challenges and responses. During
the timed phases, only single-bit messages should be exchanged.
This assumption has been widely adopted in most academic
distance-bounding protocols, except for a few exceptions, such
as [31]. The assumption is however challenged by practical imple-
mentations: new relay-counteractions by 3DB [16], Mastercard’s
relay resistance protocol [20] and NXP’s distance-bounding proto-
col [37]. These practical protocols share a similar design: during
the timed phase, the verifer sends a bitstring nonce and the prover
replies with another bitstring nonce. Afterwards, the prover sends
a message authenticating the transcript (including both nonces),
either via a signature or a MAC.
Assumption 2: Error tolerance. Distance-bounding protocols
must account for the bit errors that occur during the timed phases.
Tolerance of transmission-errors is typically provided by grant-
ing authentication even if not all responses are correct, but no more
than a given proportion/number are incorrect. Yet, enforcing such
tolerances generally lowers DB security. For instance, the DB3 pro-
tocol [24] with noise tolerance generally requires 43 rounds for
a security-level equivalent to 20 rounds of its noiseless version.
Moreover, it was shown that noise-tolerance lead to terrorist frauds
on some protocols that were otherwise secure [22].
1