Revisiting Error-Correction in Precommitment Distance-Bounding Protocols

被引:2
|
作者
Zhang, Jingyi [1 ]
Yang, Anjia [2 ]
Hu, Qiao [3 ]
Hancke, Gerhard Petrus [1 ]
Liu, Zhe [4 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Error correction codes; Security; Terrorism; Systematics; Statistical analysis; Noise measurement; Distance-bounding (DB) protocol; relay attack;
D O I
10.1109/TII.2021.3134956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding (DB) protocols are used to verify the physical proximity of two devices. DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things, e.g., nodes can verify they are deployed in the same location and monitoring the same piece of equipment. Thresholds and error correction codes (ECCs) are two methods to provide error-resilience for DB protocols working in noisy environments. However, the threshold method adds overheads and the ECC method increases the adversary success probability, compared to threshold, when implemented in precommitment DB protocols. In this article, we investigate the ECC method and demonstrate that designers can mitigate increased adversary success probability by using nonsystematic codes. To demonstrate this idea, we compare a prominent precommitment protocol by Brands and Chaum (BC) integrated with different types of ECCs with two existing error-resilience methods, showing how nonsystematic codes provide improved protocol security. Moreover, We further evaluate the BC protocol with nonsystematic ECCs and discuss how to configure protocols to minimize the protocol failure rate, while maintaining adequate attack success probability.
引用
收藏
页码:7097 / 7106
页数:10
相关论文
共 37 条
  • [1] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [2] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [3] On the optimal resistance against mafia and distance fraud in distance-bounding protocols
    Gil-Pons, Reynaldo
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2023, 210 : 69 - 78
  • [4] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [5] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [6] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [7] Distance-bounding protocol with time-stamped authentication for RFID
    Wei Guo-heng
    Zhang Huan-guo
    Li Zheng
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 139 - 145
  • [8] Survey of Distance Bounding Protocols and Threats
    Brelurut, Agnes
    Gerault, David
    Lafourcade, Pascal
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
  • [9] Distance-bounding trust protocol in anonymous radio-frequency identification systems
    Yang, Fan
    Zhang, Fengli
    Wang, Jiahao
    Qin, Zhiguang
    Yuan, Xiaolu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (16) : 4211 - 4229
  • [10] Multihop Distance-Bounding for Improving Security and Efficiency of Ad-Hoc Networks
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    Huang, Zhong
    Inserra, Daniele
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5312 - 5323