Distance-bounding Identification

被引:2
|
作者
Ahmadi, Ahmad [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Distance-bounding; Identification; Public-key; MiM;
D O I
10.5220/0006211102020212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model with other existing models, and give a construction that is secure in the proposed model.
引用
收藏
页码:202 / 212
页数:11
相关论文
共 50 条
  • [21] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [22] Distance bounding in noisy environments
    Singelee, Dave
    Preneel, Bart
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 101 - +
  • [23] Distance Bounding Facing Both Mafia and Distance Frauds
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) : 5690 - 5698
  • [24] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159
  • [25] Survey of Distance Bounding Protocols and Threats
    Brelurut, Agnes
    Gerault, David
    Lafourcade, Pascal
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
  • [26] RFID Distance Bounding Multistate Enhancement
    Avoine, Gildas
    Floerkemeier, Christian
    Martin, Benjamin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 290 - +
  • [27] Persistent Distance Bounding for Mobile Provers
    Nkrow, Raphael E.
    Boshoff, Dutliff
    Silva, Bruno J.
    Liu, Zhe
    Hancke, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [28] An Efficient RFID Distance Bounding Protocol
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 367 - 376
  • [29] Towards Quantum Distance Bounding Protocols
    Abidin, Aysajan
    Marin, Eduard
    Singelee, Dave
    Preneel, Bart
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 151 - 162
  • [30] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding
    Trujillo-Rasua, Rolando
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302