Distance Bounding: A Practical Security Solution for Real-Time Location Systems

被引:49
|
作者
Abu-Mahfouz, Adnan [1 ]
Hancke, Gerhard P. [1 ,2 ]
机构
[1] Univ Pretoria, ZA-0002 Pretoria, Gauteng, South Africa
[2] Univ London, ISG, Egham TW20 0EX, Surrey, England
关键词
Distance-bounding; proximity authentication; real-time location; RFID; secure neighbor detection (SND); secure ranging; wireless; SUPPLY CHAIN; ATTACKS; CHALLENGES; PROTOCOL;
D O I
10.1109/TII.2012.2218252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 50 条
  • [21] Schedulability driven security optimization in real-time systems
    Lin, Man
    Yang, Laurence T.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 314 - +
  • [22] Guiding the selection of security patterns for real-time systems
    Motii, Anas
    Hamid, Brahim
    Lanusse, Agnes
    Bruel, Jean-Michel
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 155 - 164
  • [23] Modelling security risks in real-time operating systems
    Kiszka, Jan
    Wagner, Bernardo
    2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
  • [24] Partial security and timeliness in real-time database systems
    Son, SH
    PARALLEL AND DISTRIBUTED PROCESSING, 1998, 1388 : 1117 - 1120
  • [25] Maintaining security in firm real-time database systems
    Ahmed, QN
    Vrbsky, SV
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 83 - 90
  • [26] Analyzing the security and survivability of real-time control systems
    Oman, P
    Krings, A
    de Leon, DC
    Alves-Foss, J
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 342 - 349
  • [27] Real-time security assessment of electrical power systems
    Groom, CG
    Chan, KW
    Dunn, RW
    Daniels, AR
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1996, 11 (02) : 1112 - 1117
  • [28] Real-Time Medical Data Security Solution for Smart Healthcare
    Sarosh, Parsa
    Parah, Shabir Ahmad
    Malik, Bilal Ahmad
    Hijji, Mohammad
    Muhammad, Khan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (07) : 8137 - 8147
  • [29] Real-time Security Solution for Automatic Detection and Tracking of Intrusion
    Bar, Debesh
    Pande, Dhruv
    Sandhu, Manveer Singh
    Upadhyaya, Vikas
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 399 - 402
  • [30] A Survey About Real-Time Location Systems in Healthcare Environments
    Bazo, Rodrigo
    da Costa, Cristiano Andre
    Seewald, Lucas Adams
    da Silveira Jr, Luiz Gonzaga
    Antunes, Rodolfo Stoffel
    Righi, Rodrigo da Rosa
    Rodrigues, Vinicius Facco
    JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (03)