Distance Bounding: A Practical Security Solution for Real-Time Location Systems

被引:49
|
作者
Abu-Mahfouz, Adnan [1 ]
Hancke, Gerhard P. [1 ,2 ]
机构
[1] Univ Pretoria, ZA-0002 Pretoria, Gauteng, South Africa
[2] Univ London, ISG, Egham TW20 0EX, Surrey, England
关键词
Distance-bounding; proximity authentication; real-time location; RFID; secure neighbor detection (SND); secure ranging; wireless; SUPPLY CHAIN; ATTACKS; CHALLENGES; PROTOCOL;
D O I
10.1109/TII.2012.2218252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 50 条
  • [41] Design of Adaptive Security Mechanisms for Real-Time Embedded Systems
    Saadatmand, Mehrdad
    Cicchetti, Antonio
    Sjodin, Mikael
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 121 - 134
  • [42] Integrating fault recovery and quality of security in real-time systems
    Bellam, Kiranmai
    Zong, Ziliang
    Alghamdi, Mohammed. I.
    Nijim, Mais
    Qin, Xiao
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 500 - +
  • [43] Circuits and systems for real-time security and copyright protection of multimedia
    Mohanty, Saraju P.
    Memon, Nasir
    Chatha, Kararn S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) : 231 - 234
  • [44] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [45] Maintaining integrity constraints and security in real-time database systems
    Ahmed, QN
    Vrbsky, SV
    INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS, 1998, : 255 - 269
  • [46] Threats to Information Security of Real-Time Disease Surveillance Systems
    Henriksen, Eva
    Johansen, Monika A.
    Baardsgaard, Anders
    Bellika, Johan G.
    MEDICAL INFORMATICS IN A UNITED AND HEALTHY EUROPE, 2009, 150 : 710 - 714
  • [47] Systematic security and timeliness tradeoffs in real-time embedded systems
    Kang, Kyoung-Don
    Son, Sang H.
    12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 183 - +
  • [48] Security Solution for Real-Time Data Access in Wireless Sensor Networks
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 37 - 48
  • [49] Bounding Deadline Misses in Weakly-Hard Real-Time Systems with Task Dependencies
    Hammadeh, Zain A. H.
    Ernst, Rolf
    Quinton, Sophie
    Henia, Rafik
    Rioux, Laurent
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 584 - 589
  • [50] Bounding End-to-End Delay for Real-Time Environmental Monitoring in Avionic Systems
    Jin, Daeha
    Ryu, Junhee
    Park, Juyoung
    Lee, Jaemyoun
    Shin, Heonshik
    Kang, Kyungtae
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 132 - 137