1. Introduction
Proximity detection is widely used in a variety of applications, such as toilet flush sensors, parking assistance, payment systems, transportation ticketing, physical access control [
1], contagion tracking [
2], and PKES systems [
3]. In particular, in PKES systems, car doors are unlocked automatically when the vehicle detects the key fob in the vicinity. PKES systems allow users to open their cars without active user interaction with the keys, and the only thing they need to do is get close to their cars. Unlike other applications, the PKES system requires a more accurate and secure proximity detection technique since it is related to property directly. With the prevalence of keyless systems, the significance of secure proximity detection is increasing.
Today, modern cars that use PKES systems rely on challenge–response approaches [
3,
4]. Since PKES systems do not require user interaction, the user cannot notice whether their keys are working or not. Hence, the attacker can freely access the key and relay the signal responses to the car to purport that the key is in the vicinity. This is an example of a relay attack. Although the attacker lacks knowledge on how to respond to the challenge, he or she can argue the proximity and pass authentication by only relaying the signals between the car and the key.
Unfortunately, most proximity detection techniques are inherently insecure, because no matter how well designed the cryptographic protocols in RFID devices are, they cannot avoid the threat of distance-decreasing attacks [
5,
6]. Since these attacks do not require the messages to be modified or decrypted, the prover and verifier may not be aware of such attacks [
7,
8]. Even worse, the widespread adoption of the Internet of Things has led to a proliferation of proximity detection applications without proper consideration of the threat posed by wireless distance-decreasing attacks, such as relay attacks [
9,
10]. Therefore, it is obvious that the design of a secure proximity detection system is necessary [
11].
Conventional proximity detection techniques can be classified as follows. First, several techniques use distance-bounding protocols using the measured received signal strength indication (RSSI) or time of flight (ToF). These mainly depend on changes in the physical layer’s radiometric characteristics due to signal propagation. However, an attacker can deceive the communication systems with an amplified signal strength or relayed signals [
3,
12]. To detect the relayed signals from a distance, a response timeout (i.e., RTT) is given by distance-bounding protocols [
13,
14,
15,
16,
17]. However, the precision of the time estimate depends on the system’s bandwidth. For example, commercial proximity detection transceivers typically use sampling rates of up to 2 Mbps. This restriction leads to a large spacing of 150 m, given the speed of light. This space is considered a sufficient distance for an attacker to commit relay attacks. Furthermore, D. Celiano pointed out that overclocked electromagnetic carriers can speed up the computation of an NFC card and allow relay attacks within the timeout period [
18].
Typically, short-range communication technologies such as radio frequency identification (RFID) and near-field communication (NFC) can be used as inherent proximity detection techniques. Based on their limited communication ranges, they are common communication technologies for proximity detection systems. Unfortunately, relay attacks on these technologies easily compromise the systems, even though they use cryptographic approaches [
12,
19,
20,
21].
Another method is a context-based co-presence detection technique based on the fact that the vehicle and the key fob should share the same context information, such as the GPS location, humidity, temperature, barometer, and altitude [
22,
23]. Since the technique requires the exchanges of information obtained from additional sensor modalities, both cars and key fobs have to pay an extra cost for the additional hardware, power, and time to collect the environmental factors for each detection attempt. This restriction discourages market entry.
In this context, we propose
BackProx, a new secure proximity detection technique that uses an additional backscatter tag to resist relay attacks.
BackProx is basically based on multi-carrier phase information. In our attack models, the attacker manipulates the phase information in a signal and relays it to the verifier without any knowledge of the cryptographic primitives implemented. Existing carrier phase-based proximity detection techniques are vulnerable to phase-manipulating attacks [
24]. Briefly, the distance estimate from the phase information is vulnerable to phase manipulation attacks because the estimated distance can be decreased or increased by the attacker.
To address this vulnerability, we designed a novel relay-resilient proximity detection scheme called
BackProx. Instead of using a single key fob,
BackProx uses an additional backscatter tag to prove proximity, as shown in
Figure 1. The additional tag provides evidence of proximity in relay attacks. We do not estimate the distance between the verifier and prover but compare the distances among the additional tag, verifier, and prover. To purport proximity, the attacker would change the phase information from the response signals. The change causes estimation errors from the tag to the verifier and the prover to the verifier.
BackProx then calculates the difference between the two phase values measured by the verifier, which effectively mitigates the effects of phase manipulation. Our evaluation demonstrates that
BackProx can resist the relay attacks effectively and achieve a 98% true positive rate at close range and a low false positive rate of 0.3% at far range.
The main contributions of this paper are as follows:
We present BackProx, a novel and secure proximity detection system which uses an additional backscatter tag to provide evidence of proximity.
We investigate concrete attack models for relay attacks and examine how BackProx defends against these attacks effectively. Our security analysis is theoretical and aims to provide the mechanisms behind the resistance of BackProx to these attacks.
We provide analytic evaluation of BackProx and demonstrate its proximity detection performance.
The rest of this paper is organized as follows. In
Section 2, we review the previous work on proximity detection.
Section 3 presents a system model for
BackProx and includes the conventional phase-based proximity detection schemes in the literature. The concrete attack models against phase-based proximity detection schemes are explained in
Section 4.
Section 5 describes the technique details of
BackProx. We present an analytical evaluation of
BackProx that provides theoretical analysis of how
BackProx resits relay attacks and its proximity detection performance in
Section 6.
Section 7 addresses the limitations of
BackProx and suggests potential countermeasures to improve security, as well as a future work direction. Finally, we conclude this paper in
Section 8.
2. Related Work
Recently, there has been interest in using the characteristics of radio frequencies (RFs) for proximity detection. In [
25], the authors utilized their observations on fluctuations of ZigBee signals in the near field. However, the approach does not address the threat of relay attacks. HODOR [
26] is based on an RF fingerprinting approach that verifies an RF’s features using a trained classifier. While the method is effective, it requires the extraction of an RF’s features, which are highly specific to the current environment, devices, and other factors and which can be time-consuming or may not be feasible for everyday users. Additionally, HODOR assumes that the key fob is an active transmitter with an oscillator. Since a passive RFID-based key fob backscatters the ambient RF signals from a dedicated carrier emitter instead of emitting the carrier frequency itself, the features introduced in HODOR cannot be applied directly. In this context, we propose a new relay-resilient proximity detection method,
BackProx, which uses the RF’s characteristics but does not require any training sets.
Other approaches have incorporated machine learning techniques to mitigate relay attacks [
27,
28]. The proposed methods utilize security features including key fob acceleration, signal strength, location, and time to achieve a high accuracy rate of 99.8%. However, these approaches rely heavily on a time-consuming and labor-intensive feature data collection phase to establish a dataset for a legitimate user. For example, in [
27], the authors collected 3 months of key fob logs and 300 records of a driver, with each record taking 5 min to gather. Additionally, not all ambient condition sensors are available in RFID-based systems.
In SNAP [
29], the authors proposed a proximity detection method that uses a single antenna. The method is based on the observation that mismatching of WiFi signals will occur at the same part in the preamble, which should appear repeatedly in each packet. When the target device is close, the received parts do not match each other due to near-field effects. However, this mismatching can also be caused by an adversary. The authors also discussed the attack and propose a countermeasure that uses a trusted device located far away to verify the proximity. If the target is legitimate, then the far away device should observe the matching in the preamble, which can help confirm the proximity. While SNAP presents a practical method for proximity detection, the requirement for an additional trusted device may not be feasible for all users.
Other recent studies, such as those on Move2Auth [
30] and RF-Rhythm [
31], proposed approaches for device authentication that are based on a change in RF characteristics. These methods use changing patterns in RF characteristics to authenticate users who are in the vicinity. However, both approaches require user interaction, which limits their usability and practicality for proximity detection applications such as PKES. To provide practical proximity detection applications, it is important to design systems that do not require user interaction and operate in a seamless manner.
BackProx uses a multi-tag based technique to provide a practical solution for secure proximity detection in existing systems. In this context, there are several studies that proposed security enhancement methods based on multi-tag technology, such as Butterfly [
32], SCBF [
33], Tagora [
34], and Hu-Fu [
35]. These approaches aim to minimize environmental sensitivity [
32] or use collision signals [
33,
34] or inductive coupling [
35] as a kind of fingerprint to authenticate backscattering devices. While these methods are effective at providing resistance to traceability, impersonation attacks, and environmental sensitivity, they require the users to have redundant tags or reduce the authentication range dramatically, which limits the design space for backscattering applications such as PKES systems [
3].
BackProx has a similar approach to providing security enhancement, but it does not require the user to have additional devices or a limited range, which makes it more practical and convenient for everyday users.
3. System Model
Suppose we have a PKES system with a passive RFID-based key fob. When a legitimate user tries to unlock the door by pulling the door handle, the car emits an excitation signal to wake up the key fob. The key fob backscatters the excitation signal and transmits its response message. From this point on, we call the car the verifier and the key fob the prover.
From the perspective of a backscattering communication system, the verifier acts as a reader with prudent power and computation resources. When the verifier transmits a constant wave (CW) as the excitation signal, the tag at the prover backscatters the CW to the verifier with its modulated message. The response message is received at the verifier, and the phase is measured. Then, the phase is expressed as follows [
36]:
At the verifier, the received signal is propagated from the reader’s transmitter antenna to the tag and back to the reader’s receiver antenna as shown in
Figure 2.
The phase change caused by the signal’s propagation (i.e.,
) can be calculated as
, where
d is the distance between the verifier and prover and
is the wavelength of the CW. The orientation of the tag also affects the phase information
. It is constant and does not change depending on the frequency. The phase values caused by the impedance of the reader and tag are denoted by
and
, respectively. Although the previous work shows the impedance changes according to the attached material [
37], we assume that the tagged material does not change during the proximity detection process. Thus, the phase change caused by impedance is stable. Now, we can express Equation (
1) as follows:
For simplicity, commercial off-the-shelf (COTS) RFID systems [
38] and the existing work [
39] often summarize the stable values as a constant
k. The wavelength
at constant speed of light
c is given by
. Therefore, the relationship between the phase and frequency is given by
Equation (
3) indicates that the measured phase
changes linearly with the frequency
f, and the slope of the line is determined by a certain distance
d.
For multi-carrier phase-based proximity detection, we can use different frequencies such as
and
. From the difference between
and
, the distance estimate is expressed as
Then, if the system estimates the distance
d to be less than a certain threshold, then it decides the proximity of the prover. However, when an attacker manipulates the measured phase information as he or she wants, this decision can be compromised. The details of the attacks are described in
Section 4. In the attacks,
BackProx uses an additional backscatter tag to provide evidence for proximity. The additional tag also acts as an ordinary backscattering tag in the prover that satisfies Equations (
1)–(
4).
4. Adversarial Model
With the prevalence of low-cost software-defined radio systems, an attacker can easily eavesdrop on, manipulate, replay, and relay radio signals. This means that the attacker has full control over the wireless radio channels used to authenticate the proximity. We posit that the attacker does not know encryption techniques at all. Therefore, this paper focuses on the capability of an attacker that manipulates the radio signals in the physical layer.
The adversarial model is based on the Chess Grandmaster problem [
40]. In this problem, a little girl who does not know how to play chess plays two chess games against grandmasters at the same time: one with black and the other with white. Then, by only relaying the moves of each grandmaster, she can defeat at least one grandmaster. If we apply this problem to our model, then an attacker can deceive a verifier by relaying the signals from a prover without any knowledge of implemented cryptographic primitives.
The goal of an attacker is to deceive the proximity detection at a verifier, where the attacker is located close to the verifier and the prover is outside the neighborhood. In particular, our adversarial model focuses on relay attacks that relay the legitimate signals from the prover to pretend to be close to the verifier. Some early papers considered a weaker relay attack model that relays only the messages between a verifier and a prover without any manipulation. However, this weak relay attack model could be defended by basic phase- or ToF-based distance-bounding protocols.
For a stronger adversarial model, we consider three concrete attack models that try to decrease the distance, such as a phase-slope rollover attack, an RF cycle slip attack, and an on-the-fly phase manipulation attack [
24]. In the following, we describe the details of these attack models.
4.1. Phase-Slope Rollover Attack
For distance estimation based on multi-carrier phase information, a phase difference caused by radio propagation is used. However, if an attacker manipulates the phase information as he or she wants, then this can lead to an estimation error.
In the phase-slope rollover attack, the attacker simply injects the intended phase rotation
to all response signals from the prover. Recall from Equation (
4) that the estimated distance
d is proportional to the phase difference, denoted by
. Since the phase value ranges from 0 to
, the maximum value of
is
. If the phase value exceeds
, it returns to zero (rollover). The attacker can manipulate the phase difference with a time delay
before relaying the response signals. A specific time delay is chosen to trigger the phase rollover.
We assume that the attacker is located close to the verifier and the prover is far away from the verifier, as shown in
Figure 3. The goal of the attacker is to reduce the estimated distance from the verifier.
The phase information for the phase-slope rollover attack is derived with the time delay
as follows:
The round-trip time
t is the total time it takes for a signal to travel from a transmitter to a receiver and back over a certain distance
d. Since the verifier uses multi-carrier frequencies, two phase values are used, such as
and
. We express the phase difference as
, where
. The frequency difference between the two phase measurements is denoted by
. To estimate the distance, Equation (
4) is given by
The modulo operation is added due to the maximum phase difference
. If the attacker injects a certain
which causes rollover of the modulo operation, then it leads to a reduced distance at the verifier. In general cases,
is specified as 2 MHz and presents 75 m as a maximum distance.
As shown in
Figure 4, the graph illustrates the trend of each phase value and the difference depending on the time delay
introduced by the attacker, where the distance is 10 m and the frequency hopping size is 2 MHz. This shows that the estimated distance also goes through the rollover effect, depending on the time delay introduced. The rollover effect occurs when the distance estimation exceeds a certain limit and returns to the starting point, which could result in incorrect distance readings and could be used by an attacker to inject a false distance.
4.2. RF Cycle Slip Attack
An RF cycle slip attack is similar to the phase-slope rollover attack, except for the values for the time delay. In the attack previously described, the attacker relays all the response signals with the same time delay. On the other hand, in this attack, the attacker manipulates the phase values of individual carrier frequencies. For each frequency , the attacker selects a different time delay .
The phase difference is specified by the time delays
and
for the frequencies
and
, respectively. Then, the estimated distance from Equation (
4) is given by
Briefly, the attacker can manipulate the phase information at the verifier using different time delays for each frequency. However, this attack requires more high-cost hardware than the phase-slope rollover attack, since it needs a very high sampling rate to know the individual frequencies before injecting the time delays.
4.3. On-the-Fly Phase Manipulation Attack
In on-the-fly (OTF) phase manipulation attacks, the attacker does not simply relay the response signals. Instead, an intermediate frequency (IF) signal is used to manipulate the phase rotation. At the attacker device, the response signal is intercepted and mixed with an IF signal generated by the attacker.
We assume that the response signal from the prover is
:
where
is the amplitude modulated by the prover. The attacker receives the response signal and generates an intermediate frequency signal
:
where
denotes the injected phase offset by the attacker.
The attacker uses a mixer to manipulate the phase information in the response signal. After mixing of the two signals in Equations (
8) and (
9), the manipulated signal is given by
The attacker then transmits the manipulated signal through a low-pass filter that removes the high-frequency component. In short, the phase information of the received signal at the verifier can be manipulated with the injected phase offset .
5. Methodology
Proving secure proximity detection in wireless systems is not trivial. To be a secure proximity detection technique, we should consider a number of design requirements. We first show the design requirements for secure proximity detection. Then, an overview of the proposed method, BackProx, is presented. Next, we elaborate on the design of BackProx, which uses an additional backscattering tag with multi-carrier frequencies.
5.1. Design Requirements
We provide the design requirements for BackProx, which are as follows:
Requirement 1. The proposed solution should be easily adaptable to existing systems. The target of BackProx is assumed to be currently used proximity-based applications such as PKES systems. On the other side, the solutions based on RF radiometric characteristics cannot be applied to the systems currently in use. The main reason for this is that the solutions require reader hardware such as a software-defined radio that is able to measure an RF’s radiometric characteristics.
Requirement 2. The proposed solution does not require any changes in the upper layer protocols. Since the upper layer is not involved in the physical layer, an adversary can easily perform a distance-decreasing attack by relaying a signal, regardless of the encryption technique being used. BackProx is designed to provide secure proximity detection while still being able to utilize already-existing protocols. This means that BackProx is designed to work seamlessly with the encryption technologies that are currently in place without the need for modifications to be made to the upper layer protocols.
Requirement 3. The proposed solution should be able to defend against relay attacks with legitimate tag signals. To ensure secure proximity detection, the solution should be able to defend against the different types of relay attacks described in
Section 4. This means that
BackProx should be designed with the ability to prevent relay attacks and be resilient enough to maintain its performance even when facing these types of attacks.
5.2. Overview
The core of BackProx is the use of a simple-to-use backscattering tag. BackProx consists of three entities: the additional tag and reader, which are owned by the verifier, and the legitimate tag, which is owned by the prover. The additional tag performs the same function as the legitimate tag of the prover, but it is installed by the verifier, which makes it a trusted object at close range. We assume that the additional tag is trustworthy and not compromised by an attacker. The legitimate tag and the additional tag respond in sequence to the signal sent by the verifier, following the existing COTS RFID communication protocol without requiring any additional features to be extracted from the RF signals. This makes it easy to integrate BackProx into existing systems without the need to change the upper layer’s protocols.
5.3. BackProx Details
Currently, communication protocols for proximity detection in COTS PKES systems involve a wake-up signal from the verifier and a response from the prover, as described in [
3]. In addition, to start the engine, proximity detection is carried out through backscattering communication between the vehicle and the RFID tag inside the key fob.
BackProx maintains communication between the reader and the legitimate tag and also performs supplementary communication with the additional tag. This approach assumes a multi-tag scenario in backscattering networks, and it can easily be implemented in existing systems.
Figure 5 illustrates the protocol for sequential tag interrogation.
Essentially,
BackProx utilizes a multi-carrier phase-based proximity detection method, where each tag (the one inside the prover and the additional tag) is interrogated with multiple frequencies. At this time, the response order of each tag is not specified, and the tag is read according to the reader’s selected command [
41]. As shown in
Figure 5, multi-carrier phase measurements should be performed through two or more frequencies. Since multi-carrier frequencies are also recommended in FCC 15.247 as a frequency hopping spread spectrum (FHSS) scheme [
42], it is applicable in COTS backscatter systems. Additionally, the measurement process can be repeated more than two times using options.
The decision basis for proximity detection in
BackProx relies on the locations of both the additional tag and the legitimate tag in close proximity. Since the additional tag belongs to the verifier and is fixed in a specific location, the proximity of the additional tag to the legitimate tag indicates that the legitimate tag is within the proximity of the verifier. The reader measures the phase information from each tag for each frequency. The measured phase information is referred to as
and
. The equation for the phase information is given by Equation (
3). In this case, LT and AT refer to the legitimate tag and the additional tag, respectively.
To prove the distance similarity of the two tags,
BackProx uses the phase difference between
and
. Since the response signals from the tags are based on the same frequency
f, the phase difference is expressed as follows:
where
denotes the difference between the stable rotations (i.e.,
). Equation (
11) indicates that the phase difference
is proportional to the frequency
f, and the slope is determined by the distance difference
. If the legitimate tag is near the additional tag (i.e., alongside the verifier), then this leads to a very low slope value. Otherwise, the slope will be large. Therefore, the slope can be the basis for determining the proximity.
We denote the slope of the phase function as
.
BackProx obtains the phase information by using two or more multi-carrier frequencies to estimate the slope value. To determine the proximity, we set a threshold
. If the slope of the phase difference is above the threshold, then
BackProx determines that the key fob is in the neighborhood. Otherwise, it determines that the response is not valid. The decision rule can be expressed as
7. Discussion and Future Work
While
BackProx is designed to not pass the prover when over 300 cm, it is possible that phase errors occur according to channel conditions, resulting in false acceptances. To address this issue, in the protocol described in
Section 5.3, the error could be reduced by phase measurements totaling more than the mandatory two times. The average value of the phase difference is more tolerable in burst noise situations. Another approach to mitigate the error is to lower the threshold instead of the additional measurements. The threshold also affects the proximity range and the false acceptance rate. If the threshold is reduced, then it forces the user to be closer to the verifier and shrinks the proximity detection range.
The robustness of
BackProx can be improved by cooperation with existing solutions. It is worth noting that the proposed method uses only the phase information provided by the existing system, so it can be used in conjunction with existing solutions such as distance-bounding protocols [
15,
16,
17,
44], encryption techniques, or using the radiometric signatures [
26,
45] to further enhance security.
One direction for future work is to investigate the possibility of an attacker being able to manipulate the response signals from LT and AT. Specifically, the attacker could inject different time delays into each signal, which makes it more difficult to measure the phase rotation at the verifier. This indicates a stronger adversarial model where the attacker can separate the response signals using specialized equipment with a high sampling rate, such as software-defined radios.
To this end, a more complex authentication process based on a multi-tag approach can be used. This requires hardware that is capable of analyzing the signals in the physical layer. Rather than measuring each tag individually, this approach imposes tag signal collisions between AT and LT signals and receives them simultaneously. Since the response signals arrives at the adversary simultaneously, this should inject the same time delay into the collided signal. This makes it impossible for the adversary to manipulate the response signal of LT or AT. This method has been used in previous studies such as [
34,
35], where it was used for simultaneous responses from multi-tagging to resist attacks such as tag counterfeiting or signal replay. We can adopt it to prevent attackers from separating the signals and inserting different time delays. On the other hand, with collision recovery techniques [
46,
47], the verifier can still obtain the phase information of each response signal, allowing application of the
BackProx methodology.