Distance bounding protocols: Authentication logic analysis and collusion attacks

被引:0
|
作者
Meadows, Catherine [1 ]
Poovendran, Radha [2 ]
Pavlovic, Dusko [3 ]
Chang, LiWu [1 ]
Syverson, Paul [1 ]
机构
[1] Naval Res Lab, Code 5543, Washington, DC 20375 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Kestrel Inst, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the first full-scale formal analysis of a distance bounding protocol, and we also show how this analysis helps us to reduce message and crypto-graphic complexity without reducing security. Finally, we address the important open problem of collusion. We analyze existing techniques for collusion prevention, and show how they are inadequate for addressing the collusion problems in sensor networks. We conclude with some suggestions for further research.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [21] A family of collusion resistant symmetric key protocols for authentication
    Bezawada, Bruhadeshwar
    Kothapalli, Kishore
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2008, 4904 : 387 - 392
  • [22] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [23] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [24] A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID
    WEI Guoheng
    ZHANG Huanguo
    WANG Ya
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 37 - 46
  • [25] RFID Distance Bounding Protocols with Mixed Challenges
    Kim, Chong Hee
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (05) : 1618 - 1626
  • [26] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94
  • [27] A framework for analyzing RFID distance bounding protocols
    Avoine, Gildas
    Bingol, Muhammed Ali
    Kardas, Suleyman
    Lauradoux, Cedric
    Martin, Benjamin
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 289 - 317
  • [28] The study on the application of BAN logic in formal analysis of authentication protocols
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 744 - 747
  • [29] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [30] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216