A New Secure Authentication Based Distance Bounding Protocol

被引:0
|
作者
Sultan A.R. [1 ,2 ]
Rashid I. [1 ]
Khan F. [1 ]
Tahir S. [1 ]
Pasha M. [3 ]
Sultan A. [1 ,2 ]
机构
[1] Department of Information Security, National University of Sciences and Technology, Islamabad
[2] Department of Electrical Engineering, Institute of Space Technology, Islamabad
[3] Department of Information Technology, Bahauddin Zakariya University, Multan
来源
PeerJ Computer Science | 2021年 / 7卷
关键词
Cryptography; Information leakage; Key exchange; Mafia Graud; Position verification;
D O I
10.7717/PEERJ-CS.517
中图分类号
学科分类号
摘要
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. Copyright 2021 Sultan et al.
引用
收藏
页码:1 / 28
页数:27
相关论文
共 50 条
  • [41] Restoration Protocol: Lightweight and Secure Devices Authentication Based on PUF
    Ovilla-Martinez, Brisbane
    Bossuet, Lilian
    2017 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2017, : 43 - 48
  • [42] Provably secure fog-based authentication protocol for VANETs
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Badar, Hafiz Muhammad Sanaullah
    Kharel, Rupak
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2024, 246
  • [43] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [44] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [45] Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
    Khalid, Umer
    Ghafoor, Abdul
    Irum, Misbah
    Shibli, Muhammad Awais
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 680 - 688
  • [46] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164
  • [47] Secure biometrically based authentication protocol for a public network environment
    Tait, Bobby
    von Solms, Basie
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 239 - 246
  • [48] Efficient LFSR Based Distance Bounding Protocol for Contactless EMV Payments
    Shah, Trishla
    Sampalli, Srinivas
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 275 - 290
  • [49] Eliminating rouge femtocells based on distance bounding protocol and geographic information
    Chen, Chien-Ming
    Chen, Yao-Hsin
    Lin, Yue-Hsun
    Sun, Hung-Min
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (02) : 426 - 433
  • [50] A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
    Kardas, Suleyman
    Kiraz, Mehmet Sabir
    Bingol, Muhammed Ali
    Demirci, Huseyin
    RFID SECURITY AND PRIVACY, 2012, 7055 : 78 - 93