Distance bounding protocols: Authentication logic analysis and collusion attacks

被引:0
|
作者
Meadows, Catherine [1 ]
Poovendran, Radha [2 ]
Pavlovic, Dusko [3 ]
Chang, LiWu [1 ]
Syverson, Paul [1 ]
机构
[1] Naval Res Lab, Code 5543, Washington, DC 20375 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Kestrel Inst, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the first full-scale formal analysis of a distance bounding protocol, and we also show how this analysis helps us to reduce message and crypto-graphic complexity without reducing security. Finally, we address the important open problem of collusion. We analyze existing techniques for collusion prevention, and show how they are inadequate for addressing the collusion problems in sensor networks. We conclude with some suggestions for further research.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [1] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [2] On Modeling Terrorist Frauds Addressing Collusion in Distance Bounding Protocols
    Vaudenay, Serge
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 1 - 20
  • [3] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [4] Modelling and Analysis of a Hierarchy of Distance Bounding Attacks
    Chothia, Tom
    de Ruiter, Joeri
    Smyth, Ben
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1563 - 1580
  • [5] Continuous Authentication against Collusion Attacks
    Lyu, Pin
    Cai, Wandong
    Wang, Yao
    SENSORS, 2022, 22 (13)
  • [6] Detecting collusion attacks in security protocols
    Chen, QF
    Chen, YPP
    Zhang, SC
    Zhang, CQ
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
  • [7] Post-Collusion Security and Distance Bounding
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
  • [8] Mutual Distance Bounding Protocols
    Avoine, Gildas
    Kim, Chong Hee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 830 - 839
  • [9] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [10] Group Distance Bounding Protocols
    Capkun, Srdjan
    El Defrawy, Karim
    Tsudik, Gene
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 302 - 312