Distance-bounding Identification

被引:2
|
作者
Ahmadi, Ahmad [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Distance-bounding; Identification; Public-key; MiM;
D O I
10.5220/0006211102020212
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols. Our model provides a natural way of modeling the strongest man-in-the-middle attack, making security of DB protocols in line with identification protocols. We compare our model with other existing models, and give a construction that is secure in the proposed model.
引用
收藏
页码:202 / 212
页数:11
相关论文
共 50 条
  • [41] Comparing distance bounding protocols: A critical mission supported by decision theory
    Avoine, Gildas
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2015, 67 : 92 - 102
  • [42] On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding
    Taponecco, Lorenzo
    Perazzo, Pericle
    D'Amico, Antonio A.
    Dini, Gianluca
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (02) : 257 - 260
  • [43] HB+DB: Distance bounding meets human based authentication
    Pagnin, Elena
    Yang, Anjia
    Hu, Qiao
    Hancke, Gerhard
    Mitrokotsa, Aikaterini
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 627 - 639
  • [44] Building ToF Resiliency Into UWB-Based Secure Distance Bounding Protocols
    Nkrowl, Raphael E.
    Boshoffl, Dutliff
    Silval, Bruno J.
    Liu, Zhe
    Hanekel, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [45] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27
  • [46] Lightweight non-distance-bounding means to address RFID relay attacks
    Tu, Yuju
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2017, 102 : 12 - 21
  • [47] Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close
    Karlsson, Christoffer
    Mitrokotsa, Aikaterini
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1365 - 1368
  • [48] An Improved KNN Algorithm Based on Adaptive Cluster Distance Bounding for High Dimensional Indexing
    Hong, Huang
    Juan, Guo
    Ben, Wang
    2012 THIRD GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS 2012), 2012, : 213 - 217
  • [49] Defining Secure Areas for TDOA-Enhanced Non-Ideal Distance Bounding
    Torres, Nuria Ballber
    Etzlinger, Bernhard
    Dehmollaian, Eshagh
    Springer, Andreas
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 348 - 353
  • [50] Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding
    Kachhia, Ruchi
    Agrawal, Prachi
    Das, Manik Lal
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 339 - 348