A New Secure Authentication Based Distance Bounding Protocol

被引:0
|
作者
Sultan A.R. [1 ,2 ]
Rashid I. [1 ]
Khan F. [1 ]
Tahir S. [1 ]
Pasha M. [3 ]
Sultan A. [1 ,2 ]
机构
[1] Department of Information Security, National University of Sciences and Technology, Islamabad
[2] Department of Electrical Engineering, Institute of Space Technology, Islamabad
[3] Department of Information Technology, Bahauddin Zakariya University, Multan
来源
PeerJ Computer Science | 2021年 / 7卷
关键词
Cryptography; Information leakage; Key exchange; Mafia Graud; Position verification;
D O I
10.7717/PEERJ-CS.517
中图分类号
学科分类号
摘要
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. Copyright 2021 Sultan et al.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 50 条
  • [21] Secure Handover Authentication Protocol Based on Bilinear Pairings
    Jia-Lun Tsai
    Nai-Wei Lo
    Tzong-Chen Wu
    Wireless Personal Communications, 2013, 73 : 1037 - 1047
  • [22] Secure Handover Authentication Protocol Based on Bilinear Pairings
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) : 1037 - 1047
  • [23] Secure Transaction Authentication Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Abi-Char, Pierre E.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 261 - 273
  • [24] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [25] Protocol of secure mutual authentication
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    Ushakov, Dmitriy
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 43 - +
  • [26] Practical and Provably Secure Distance-Bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 248 - 258
  • [27] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 485 - 495
  • [28] Distance Bounding Protocol for RFID Systems
    Zhou, Yajian
    Zhou, Jingxian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 241 - 249
  • [29] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [30] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257