Home

distancebounding

Distance bounding is a cryptographic protocol that measures the upper bound on the physical distance between a verifier and a prover by timing the round‑trip delay of exchanged messages. The verifier sends a rapid challenge, to which the prover must reply almost instantaneously; the elapsed time, divided by the speed of light, yields the maximum separation. The technique was first introduced by Brands and Chaum in 1993 to counter relay attacks in authentication systems.

The primary goal of distance bounding is to provide location assurance, preventing a distant adversary from

Typical distance‑bounding protocols consist of three phases: initialization (exchange of cryptographic keys), rapid bit‑exchange (a sequence

Security analysis focuses on resistance to distance fraud (a dishonest prover claiming to be closer), mafia

Challenges remain in implementing high‑precision timing on low‑cost hardware, addressing environmental factors that affect signal propagation,

masquerading
as
a
nearby
device.
It
is
widely
used
in
contactless
payment
cards,
keyless
entry
systems
for
automobiles,
and
wireless
sensor
networks.
In
payment
contexts,
distance
bounding
helps
detect
“mafia
fraud,”
where
an
attacker
relays
communications
between
a
legitimate
card
and
a
compromised
terminal.
of
challenge‑response
pairs
with
minimal
processing),
and
verification
(checking
response
correctness
and
timing).
Variants
differ
in
the
number
of
bits
exchanged,
the
cryptographic
primitives
used,
and
whether
they
incorporate
error‑tolerant
or
noise‑resilient
mechanisms.
fraud
(relay
attack),
and
terrorist
fraud
(collusion
with
a
nearby
malicious
device).
Countermeasures
include
multi‑frequency
signaling,
channel
hopping,
and
physical‑layer
fingerprinting.
and
standardizing
interoperable
protocols.
Ongoing
research
explores
integration
with
ultra‑wideband
radios,
quantum‑resistant
primitives,
and
use
in
emerging
Internet‑of‑Things
applications.