Distance bounding protocols: Authentication logic analysis and collusion attacks

被引:0
|
作者
Meadows, Catherine [1 ]
Poovendran, Radha [2 ]
Pavlovic, Dusko [3 ]
Chang, LiWu [1 ]
Syverson, Paul [1 ]
机构
[1] Naval Res Lab, Code 5543, Washington, DC 20375 USA
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] Kestrel Inst, Palo Alto, CA 94304 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the first full-scale formal analysis of a distance bounding protocol, and we also show how this analysis helps us to reduce message and crypto-graphic complexity without reducing security. Finally, we address the important open problem of collusion. We analyze existing techniques for collusion prevention, and show how they are inadequate for addressing the collusion problems in sensor networks. We conclude with some suggestions for further research.
引用
收藏
页码:279 / +
页数:3
相关论文
共 50 条
  • [41] Distance Bounding Protocol for Multiple RFID Tag Authentication
    Kapoor, Gaurav
    Zhou, Wei
    Piramuthu, Selwyn
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120
  • [42] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding
    Trujillo-Rasua, Rolando
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302
  • [43] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [44] Key establishment using secure distance bounding protocols
    Singelee, Dave
    Preneel, Bart
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
  • [45] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [46] Optimal Security Limits of RFID Distance Bounding Protocols
    Kara, Orhun
    Kardas, Suleyman
    Bingol, Muhammed Ali
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
  • [47] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
  • [48] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [49] Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
    Poturalski, Marcin
    Flury, Manuel
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Le Boudec, Jean-Yves
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1334 - 1344
  • [50] Lightweight Distance Bounding Protocol against Relay Attacks
    Kim, Jin Seok
    Cho, Kookrae
    Yum, Dae Hyun
    Hong, Sung Je
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (04): : 1155 - 1158