Distance bounding protocols: Authentication logic analysis and collusion attacks

被引:0
|
作者
Meadows, Catherine [1 ]
Poovendran, Radha [2 ]
Pavlovic, Dusko [3 ]
Chang, LiWu [1 ]
Syverson, Paul [1 ]
机构
[1] Naval Res Lab, Code 5543, Washington, DC 20375 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Kestrel Inst, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the first full-scale formal analysis of a distance bounding protocol, and we also show how this analysis helps us to reduce message and crypto-graphic complexity without reducing security. Finally, we address the important open problem of collusion. We analyze existing techniques for collusion prevention, and show how they are inadequate for addressing the collusion problems in sensor networks. We conclude with some suggestions for further research.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [11] Attacks on a distance bounding protocol
    Munilla, Jorge
    Peinado, Alberto
    COMPUTER COMMUNICATIONS, 2010, 33 (07) : 884 - 889
  • [12] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [13] Analysis of Authentication Protocols Based on Rubin Logic
    Xu, Yang
    Xie, Xiaoyao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4680 - +
  • [14] A bound on attacks on authentication protocols
    Stoller, SD
    FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [15] Validating attacks on authentication protocols
    Hagalisletto, Anders Moen
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
  • [16] Errors in attacks on authentication protocols
    Hagalisletto, Anders Moen
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
  • [17] Distance Bounding Protocol for Mutual Authentication
    Yum, Dae Hyun
    Kim, Jin Seok
    Hong, Sung Je
    Lee, Pil Joong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 592 - 601
  • [18] Towards Quantum Distance Bounding Protocols
    Abidin, Aysajan
    Marin, Eduard
    Singelee, Dave
    Preneel, Bart
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 151 - 162
  • [19] Survey of Distance Bounding Protocols and Threats
    Brelurut, Agnes
    Gerault, David
    Lafourcade, Pascal
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
  • [20] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159