Distance Bounding: A Practical Security Solution for Real-Time Location Systems

被引:49
|
作者
Abu-Mahfouz, Adnan [1 ]
Hancke, Gerhard P. [1 ,2 ]
机构
[1] Univ Pretoria, ZA-0002 Pretoria, Gauteng, South Africa
[2] Univ London, ISG, Egham TW20 0EX, Surrey, England
关键词
Distance-bounding; proximity authentication; real-time location; RFID; secure neighbor detection (SND); secure ranging; wireless; SUPPLY CHAIN; ATTACKS; CHALLENGES; PROTOCOL;
D O I
10.1109/TII.2012.2218252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 50 条
  • [1] Real-Time Location Systems and RFID
    Chang, J. Morris
    Huang, Yo-Ping
    Liu, Simon
    IT PROFESSIONAL, 2011, 13 (02) : 12 - 13
  • [2] Distance-bounding proof of knowledge to avoid real-time attacks
    Bussard, L
    Bagga, W
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
  • [3] SoK: Security in Real-Time Systems
    Hasan, Monowar
    Kashinath, Ashish
    Chen, Chien-Ying
    Mohan, Sibin
    ACM COMPUTING SURVEYS, 2024, 56 (09)
  • [4] Practical real-time clock calibration systems
    Makles, Piotr
    PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (12): : 30 - 34
  • [5] Bounding worst case garbage collection time for embedded real-time systems
    Kim, T
    Chang, N
    Shin, H
    SIXTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2000, : 46 - 55
  • [6] Security Issues in Industrial Real-Time Systems
    Al-Jarad, Talhah
    Al Madani, Basem
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 357 - 361
  • [7] Static Security Optimization for Real-Time Systems
    Lin, Man
    Xu, Li
    Yang, Laurence T.
    Qin, Xiao
    Zheng, Nenggan
    Wu, Zhaohui
    Qiu, Meikang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (01) : 22 - 37
  • [8] Seamless Handover and Security Solution for Real-Time Services
    Diab, Wafaa Bou
    Tohme, Samir
    2009 11TH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2009), 2009, : 363 - 368
  • [9] Bounding demand paging costs in fixed priority real-time systems
    Lee, Young-Ho
    Hwang, Hoyoung
    Kim, Kanghee
    Lim, Sung-Soo
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 4, PROCEEDINGS, 2007, 4490 : 897 - +
  • [10] Bounding cache-related preemption delay for real-time systems
    Lee, CG
    Lee, K
    Hahn, J
    Seo, YM
    Min, SL
    Ha, R
    Hong, SS
    Park, CY
    Lee, M
    Kim, CS
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2001, 27 (09) : 805 - 826