A New Secure Authentication Based Distance Bounding Protocol

被引:0
|
作者
Sultan A.R. [1 ,2 ]
Rashid I. [1 ]
Khan F. [1 ]
Tahir S. [1 ]
Pasha M. [3 ]
Sultan A. [1 ,2 ]
机构
[1] Department of Information Security, National University of Sciences and Technology, Islamabad
[2] Department of Electrical Engineering, Institute of Space Technology, Islamabad
[3] Department of Information Technology, Bahauddin Zakariya University, Multan
来源
PeerJ Computer Science | 2021年 / 7卷
关键词
Cryptography; Information leakage; Key exchange; Mafia Graud; Position verification;
D O I
10.7717/PEERJ-CS.517
中图分类号
学科分类号
摘要
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. Copyright 2021 Sultan et al.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 50 条
  • [1] A new secure authentication based distance bounding protocol
    Sultan, Ahmed Raheeq
    Rashid, Imran
    Khan, Fawad
    Tahir, Shahzaib
    Pasha, Maruf
    Sultan, Aiman
    PEERJ COMPUTER SCIENCE, 2021,
  • [2] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [4] Distance Bounding Protocol for Multiple RFID Tag Authentication
    Kapoor, Gaurav
    Zhou, Wei
    Piramuthu, Selwyn
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120
  • [5] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [6] Secure Distance Bounding Protocol on TH-UWB
    Miri, Jamel
    Nsiri, Bechir
    Bouallegue, Ridha
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 5 - 9
  • [7] A New and Efficient Distance Bounding Protocol
    Mushtaq, Muddassar
    Afzal, Mehreen
    Wahla, Muhammad Arif
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 33 - 36
  • [8] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [9] Distance-bounding protocol with time-stamped authentication for RFID
    Wei Guo-heng
    Zhang Huan-guo
    Li Zheng
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 139 - 145
  • [10] Towards Secure Distance Bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 55 - 67