Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR

被引:1
作者
Youn, Taek-Young [1 ]
Hong, Dowon [2 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
[2] Kongju Natl Univ, Kong Ju 314701, South Korea
基金
新加坡国家研究基金会;
关键词
security; authentication; distance bounding protocol; false acceptance rate; distance fraud attacks; mafia fraud attacks;
D O I
10.1587/transcom.E97.B.930
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distance bounding protocols permit a verifier to compute the distance to a prover by measuring the execution time of n rounds of challenge-response authentication. Many protocols have been proposed to reduce the false acceptance rate of the challenge-response procedure. Until now, it has been widely believed that the lowest bound of the false acceptance rate is (1/2)(n) when n is the number of rounds and the prover can send only one response bit for each round. In this paper, we propose a new distance bounding protocol whose false acceptance rate is (1/3)(n) against the distance fraud attacks and the mafia fraud attacks. To reduce the false acceptance rate, we use two challenge bits for each iteration and introduce a way of expressing three cases with the use of only one response bit, the same bit length as existing protocols. Our protocol is the first distance bounding protocol whose false acceptance rate is lower than the currently believed minimal bound without increasing the number of response bits for each round.
引用
收藏
页码:930 / 935
页数:6
相关论文
共 9 条
[1]   A framework for analyzing RFID distance bounding protocols [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Kardas, Suleyman ;
Lauradoux, Cedric ;
Martin, Benjamin .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) :289-317
[2]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[3]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[4]   An RFID distance bounding protocol [J].
Hancke, GP ;
Kuhn, MG .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :67-73
[5]  
Kardas S., 2011, P RFIDSEC 11
[6]   Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate [J].
Kim, Chong Hee .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) :1078-1080
[7]   RFID Distance Bounding Protocols with Mixed Challenges [J].
Kim, Chong Hee ;
Avoine, Gildas .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (05) :1618-1626
[8]  
Rasmussen K.B., 2010, P 19 USENIX C SEC, P13
[9]   Distance Bounding Protocol with Adjustable False Acceptance Rate [J].
Yum, Dae Hyun ;
Kim, Jin Seok ;
Hong, Sung Je ;
Lee, Pil Joong .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) :434-436