Research Article

A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme

Figure 1

An example of Mafia Fraud. An authentication is successfully executed when the prover (i.e., PKES key fob) is legitimate and close to the verifier (i.e., PKES car), as shown in Figure 1(a). Mafia Fraud attackers can amplify and relay the challenge-response signal at the physical layer to masquerade as a legitimate prover, as shown in Figure 1(b). (a) A normal authentication. (b) Mafia Fraud attack on PKES cars.
(a)
(b)