Distance bounding protocols: Authentication logic analysis and collusion attacks

被引:0
|
作者
Meadows, Catherine [1 ]
Poovendran, Radha [2 ]
Pavlovic, Dusko [3 ]
Chang, LiWu [1 ]
Syverson, Paul [1 ]
机构
[1] Naval Res Lab, Code 5543, Washington, DC 20375 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Kestrel Inst, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the first full-scale formal analysis of a distance bounding protocol, and we also show how this analysis helps us to reduce message and crypto-graphic complexity without reducing security. Finally, we address the important open problem of collusion. We analyze existing techniques for collusion prevention, and show how they are inadequate for addressing the collusion problems in sensor networks. We conclude with some suggestions for further research.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [31] A New Secure Authentication Based Distance Bounding Protocol
    Sultan A.R.
    Rashid I.
    Khan F.
    Tahir S.
    Pasha M.
    Sultan A.
    PeerJ Computer Science, 2021, 7 : 1 - 28
  • [32] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [33] A new secure authentication based distance bounding protocol
    Sultan, Ahmed Raheeq
    Rashid, Imran
    Khan, Fawad
    Tahir, Shahzaib
    Pasha, Maruf
    Sultan, Aiman
    PEERJ COMPUTER SCIENCE, 2021,
  • [34] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] Development in Authentication of AODV Protocols to Resist the Attacks
    Alomari, Ahmad
    INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2013), 2013, 403 : 334 - 344
  • [36] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [37] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [38] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [39] Some new attacks upon authentication protocols
    Wang, G.
    Qing, S.
    Zhou, Z.
    2001, Chinese Academy of Sciences (12):
  • [40] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +