Revisiting Error-Correction in Precommitment Distance-Bounding Protocols

被引:2
作者
Zhang, Jingyi [1 ]
Yang, Anjia [2 ]
Hu, Qiao [3 ]
Hancke, Gerhard Petrus [1 ]
Liu, Zhe [4 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Error correction codes; Security; Terrorism; Systematics; Statistical analysis; Noise measurement; Distance-bounding (DB) protocol; relay attack;
D O I
10.1109/TII.2021.3134956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding (DB) protocols are used to verify the physical proximity of two devices. DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things, e.g., nodes can verify they are deployed in the same location and monitoring the same piece of equipment. Thresholds and error correction codes (ECCs) are two methods to provide error-resilience for DB protocols working in noisy environments. However, the threshold method adds overheads and the ECC method increases the adversary success probability, compared to threshold, when implemented in precommitment DB protocols. In this article, we investigate the ECC method and demonstrate that designers can mitigate increased adversary success probability by using nonsystematic codes. To demonstrate this idea, we compare a prominent precommitment protocol by Brands and Chaum (BC) integrated with different types of ECCs with two existing error-resilience methods, showing how nonsystematic codes provide improved protocol security. Moreover, We further evaluate the BC protocol with nonsystematic ECCs and discuss how to configure protocols to minimize the protocol failure rate, while maintaining adequate attack success probability.
引用
收藏
页码:7097 / 7106
页数:10
相关论文
共 37 条
  • [31] Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
    Jannati, Hoda
    Falahati, Abolfazl
    INFORMATION PROCESSING LETTERS, 2015, 115 (6-8) : 623 - 629
  • [32] Performance improvement of fibre-optic code-division multiple-access systems by using error-correction codes
    Zhang, JG
    IEE PROCEEDINGS-COMMUNICATIONS, 1997, 144 (05): : 316 - 321
  • [33] Multiple channel error-correction algorithms for LCC decoding of Reed-Solomon codes and its high-speed architecture design
    Wang, Lingyu
    Zhang, Wei
    Wang, Yang
    Hu, Yan
    Liu, Yanyan
    IET COMMUNICATIONS, 2017, 11 (09) : 1407 - 1415
  • [34] Machine Learning-Based Error Correction Codes and Communication Protocols for Power Line Communication: An Overview
    Akinci, Tahir Cetin
    Erdemir, Gokhan
    Seker, Serhat
    Idriss, Abdoulkader Ibrahim
    IEEE ACCESS, 2023, 11 : 124760 - 124781
  • [35] RISC-V Galois Field ISA Extension for Non-Binary Error-Correction Codes and Classical and Post-Quantum Cryptography
    Kuo, Yao-Ming
    Garcia-Herrero, Francisco
    Ruano, Oscar
    Maestro, Juan Antonio
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 682 - 692
  • [36] Wireless energy-harvesting circuit and system with error-correction ASK demodulator for body sensor network with ultra-high-frequency RFID healthcare system
    Lee, Shuenn-Yuh
    Chen, Tsung-Yen
    Tsou, Chieh
    Chu, Yuan-Sun
    IET WIRELESS SENSOR SYSTEMS, 2018, 8 (01) : 36 - 44
  • [37] Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography
    Lai, Yenlung
    Dong, Xingbo
    Jin, Zhe
    Tistarelli, Massimo
    Yap, Wun-She
    Goi, Bok-Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3101 - 3115