Multihop Distance-Bounding for Improving Security and Efficiency of Ad-Hoc Networks

被引:2
作者
Luo, Hanguang [1 ]
Wen, Guangjun [1 ]
Su, Jian [2 ]
Huang, Zhong [1 ]
Inserra, Daniele [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; distance attacks; distance-bounding (DB); multihop; PROTOCOLS;
D O I
10.1109/JIOT.2019.2900707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding (DB) protocols are crucial solutions against "distance attacks?' Traditional one-hop DB protocols can estimate an upper-bound of the physical distance between two nodes within their communication range, but they fail when this distance exceeds their coverage. Recently, a two-hop DB protocol to verify the proximity of nodes beyond the first hop was proposed. Nonetheless, this approach is still lacking for meeting security requirements of multihop communication scenarios like ad-hoc wireless network. Motivated by this situation and considering security problems of a relay communication scenario, in this paper, we propose a multihop DB protocol, where a node can detect multihop neighbors and verify legality beyond its communication range. First, we present a description of traditional one-hop DB protocols and provide a general model for easily extending them to multihop capabilities. Then, we analyze one-hop and multihop models security giving theoretical and simulated attack success probabilities for different cases, and showing that the proposed solution can better prevent distance attacks.
引用
收藏
页码:5312 / 5323
页数:12
相关论文
共 29 条
[1]  
[Anonymous], 2017, 2017 PROGN SYST HLTH
[2]   Security of Distance-Bounding: A Survey [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Boureanu, Ioana ;
Capkun, Srdjan ;
Hancke, Gerhard ;
Kardas, Suleyman ;
Kim, Chong Hee ;
Lauradoux, Cedric ;
Martin, Benjamin ;
Munilla, Jorge ;
Peinado, Alberto ;
Rasmussen, Kasper Bonne ;
Singelee, Dave ;
Tchamkerten, Aslan ;
Trujillo-Rasua, Rolando ;
Vaudenay, Serge .
ACM COMPUTING SURVEYS, 2019, 51 (05)
[3]   Mutual Distance Bounding Protocols [J].
Avoine, Gildas ;
Kim, Chong Hee .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) :830-839
[4]   A framework for analyzing RFID distance bounding protocols [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Kardas, Suleyman ;
Lauradoux, Cedric ;
Martin, Benjamin .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) :289-317
[5]  
Avoine G, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P145
[6]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[7]  
Benvenuto C.J., 2012, Galois Field in Cryptography
[8]  
Boureanu I., 2013, P INF SEC DALL TX US, P248
[9]  
Boureanu I., 2013, FAST SOFTWARE ENCRYP, V8424, P55
[10]  
Brands D., 1993, Work-shop Theory Appl. Cryptographic Techn., P344