HB+DB: Distance bounding meets human based authentication
نویسندگان
چکیده
منابع مشابه
HB+DB: Distance bounding meets human based authentication
Authentication for resource-constrained devices is seen as one of themajor challenges in current wireless communication networks. The HB protocol by Juels and Weis provides device authentication based on the learning parity with noise (LPN) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work ha...
متن کاملThreshold-Based Distance Bounding
Conventional access control mechanisms usually rely on the use of a single token for user authentication, and are generally vulnerable to relay attacks. In addition, these systems often suffer from usability issues. Since they are centrally managed, key management tends to be a rather slow and cumbersome process in this setting. In this paper, we propose a threshold-based location-aware access ...
متن کاملDistance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus would be a prime candidate for subversion by hostile attackers. We give a brief overview and history of protocols for secure distance bounding. We also give the ...
متن کاملDistance Bounding Based on PUF
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...
متن کاملID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure distance measurement as elemental building block, and enables the implementation of secure distance bounding using commercial off-the-shelf (COTS) ranging devices. We use the proposed protocol to implement secure radio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Generation Computer Systems
سال: 2018
ISSN: 0167-739X
DOI: 10.1016/j.future.2016.05.031