Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding

被引:0
作者
Kachhia, Ruchi [1 ]
Agrawal, Prachi [1 ]
Das, Manik Lal [1 ]
机构
[1] DA IICT, Gandhinagar, India
来源
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019 | 2019年 / 11319卷
关键词
Authentication; Security; Privacy; Distance bounding;
D O I
10.1007/978-3-030-05366-6_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In conventional authentication process, the legitimacy of communicating entity is directly checked with Authentication Server. This process is found efficient; however, it allows an illegitimate entity to get his/her attempts checked upon the authentication database (e.g. password table). In this paper, we present a two-layer entity authentication protocol in which the attempt by an illegitimate entity gets discarded at the first layer with the help of a negative filtering database. To filter illegitimate attempts 100% out the negative database is constructed such that no information about the positive database that stores the credentials of legitimate users can be obtained even if the negative database gets compromised. The proposed protocol is analytically simulated with a tag-reader authentication system, which provides mutual authentication and resists relay, impersonation and replay attacks.
引用
收藏
页码:339 / 348
页数:10
相关论文
共 14 条
[1]   Internet of Things (IoT): Smart and Secure Service Delivery [J].
Bertino, Elisa ;
Choo, Kim-Kwang Raymond ;
Georgakopolous, Dimitrios ;
Nepal, Surya .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
[2]  
Das ML, 2013, LECT NOTES COMPUT SC, V8204, P56
[3]  
Dasgupta Dipankar, 2010, Proceedings of the 2010 International Conference on Emerging Security Technologies (EST 2010), P83, DOI 10.1109/EST.2010.37
[4]  
Dasgupta D., 2007, CS07001 U MEMPH
[5]  
Esponda F, 2004, TECHNICAL REPORT
[6]   Everything that is not important: Negative databases [J].
Esponda, Fernando .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2008, 3 (02) :60-63
[7]  
Esponda F, 2006, LECT NOTES COMPUT SC, V4176, P72
[8]  
González F, 2003, LECT NOTES COMPUT SC, V2787, P261
[9]   A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system [J].
Gope, Prosanta ;
Hwang, Tzonelih .
COMPUTERS & SECURITY, 2015, 55 :271-280
[10]   Confidence in smart token proximity: Relay attacks revisited [J].
Hancke, G. P. ;
Mayes, K. E. ;
Markantonakis, K. .
COMPUTERS & SECURITY, 2009, 28 (07) :615-627