A New Secure Authentication Based Distance Bounding Protocol

被引:0
|
作者
Sultan A.R. [1 ,2 ]
Rashid I. [1 ]
Khan F. [1 ]
Tahir S. [1 ]
Pasha M. [3 ]
Sultan A. [1 ,2 ]
机构
[1] Department of Information Security, National University of Sciences and Technology, Islamabad
[2] Department of Electrical Engineering, Institute of Space Technology, Islamabad
[3] Department of Information Technology, Bahauddin Zakariya University, Multan
来源
PeerJ Computer Science | 2021年 / 7卷
关键词
Cryptography; Information leakage; Key exchange; Mafia Graud; Position verification;
D O I
10.7717/PEERJ-CS.517
中图分类号
学科分类号
摘要
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. Copyright 2021 Sultan et al.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 50 条
  • [31] An Efficient RFID Distance Bounding Protocol
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 367 - 376
  • [32] A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 325 - 329
  • [33] Design and Research of a New secure Authentication Protocol in GSM networks
    Qi, Ai-qin
    Shen, Yong-jun
    INTERNATIONAL SEMINAR ON APPLIED PHYSICS, OPTOELECTRONICS AND PHOTONICS (APOP 2016), 2016, 61
  • [34] Lattice-Based Secure Biometric Authentication for Hamming Distance
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Joohee
    Shin, Junbum
    Song, Yongsoo
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 653 - 672
  • [35] The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al.
    Vladimir Belsky
    Anastasiia Chichaeva
    Vasily Shishkin
    Kirill Tsaregorodtsev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) : 485 - 495
  • [36] An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
    Avoine, Gildas
    Tchamkerten, Aslan
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 250 - +
  • [37] Group-based Secure Source Authentication Protocol for VANETs
    Lu, You
    Zhou, Biao
    Jia, Fei
    Gerla, Mario
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 202 - 206
  • [38] Building ToF Resiliency Into UWB-Based Secure Distance Bounding Protocols
    Nkrowl, Raphael E.
    Boshoffl, Dutliff
    Silval, Bruno J.
    Liu, Zhe
    Hanekel, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [39] Secure and Lightweight Authentication Protocol for NFC Tag Based Services
    Baek, Jonghyun
    Youm, Heung Youl
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 63 - 68
  • [40] Authentication Based Secure Protocol Using TTP ForWmn's
    Sharma, Parveen Kumar
    Mahajan, Rajiv
    Surender
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3286 - 3290