Distance-Bounding Protocols: Are You Close Enough?
نویسندگان
چکیده
منابع مشابه
RFID Distance Bounding Protocols
Almost all existing RFID tag/reader authentication protocols are vulnerable to mafia attacks and/or terrorist attacks from adversaries because of their inability to verify location of the tag. Several protocols have been proposed that purport to alleviate these forms of attacks. However, vulnerabilities have been identified in most of these protocols. We present and evaluate a modified distance...
متن کاملGDB: Group Distance Bounding Protocols
Secure distance bounding (DB) protocols allow one entity, the verifier, to securely obtain an upper-bound on the distance to another entity, the prover. Thus far, DB was considered mostly in the context of a single prover and a single verifier. There has been no substantial prior work on secure DB in group settings, where a set of provers interact with a set of verifiers. The need for group dis...
متن کاملTowards Quantum Distance Bounding Protocols
Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the pr...
متن کاملTimed Analysis of RFID Distance Bounding Protocols
Modelling real time is fundamental to reason about pervasive systems. The formal analysis of some time sensitive security protocols, such as distance bounding protocols, could lead to a more formal approach to time dependent properties formalisation and verification of pervasive systems.
متن کاملRational distance-bounding protocols over noisy channels
We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels in a distance-bounding protocol. The optimal threshold will ensure that even if an intruder attempts to cause incorrect authentication, the expected loss the verifier suffers will still be lower than when the intruder do...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy
سال: 2015
ISSN: 1540-7993
DOI: 10.1109/msp.2015.87