Secure, Accurate, and Practical Narrow-Band Ranging System

  • Aysajan Abidin KU Leuven, imec-COSIC, Belgium
  • Mohieddine El Soussi imec, The Netherlands
  • Jac Romme imec, The Netherlands
  • Pepijn Boer imec, The Netherlands
  • Dave Singelée KU Leuven, imec-COSIC, Belgium
  • Christian Bachmann imec, The Netherlands
Keywords: Distance Bounding, Relay Attacks, Narrow-Band Ranging, Phase-based Ranging, Time of Flight

Abstract

Relay attacks pose a serious security threat to wireless systems, such as, contactless payment systems, keyless entry systems, or smart access control systems. Distance bounding protocols, which allow an entity to not only authenticate another entity but also determine whether it is physically close by, effectively mitigate relay attacks. However, secure implementation of distance bounding protocols, especially of the time critical challenge-response phase, has been a challenging task. In this paper, we design and implement a secure and accurate distance bounding protocol based on Narrow-Band signals, such as Bluetooth Low Energy (BLE), to particularly mitigate relay attacks. Narrow-Band ranging, specifically, phase-based ranging, enables accurate distance measurement, but it is vulnerable to phase rollover attacks. In our solution, we mitigate phase rollover attacks by also measuring time-of-flight (ToF) to detect the delay introduced by such attacks. Therefore, our protocol effectively combines the best of both worlds: phase-based ranging for accuracy and time-of-flight (ToF) measurement for security. To demonstrate the feasibility and practicality of our solution, we prototype it on NXP KW36 BLE chips and evaluate its performance and relay attack resistance. The obtained precision and accuracy of the presented ranging solution are 2.5 cm and 30 cm, respectively, in wireless measurements.

Published
2021-02-23
How to Cite
Abidin, A., El Soussi, M., Romme, J., Boer, P., Singelée, D., & Bachmann, C. (2021). Secure, Accurate, and Practical Narrow-Band Ranging System. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(2), 106-135. https://doi.org/10.46586/tches.v2021.i2.106-135
Section
Articles