Range Authentication Protocols for Localization

نویسندگان

  • Catherine Meadows
  • Paul Syverson
چکیده

A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distance bounding protocols were originally proposed for the verification of proximity. More recently, they, and a similar type of protocol with somewhat different trust assumptions, the authenticated ranging protocol, have been proposed for secure localization in sensor networks. Many localization techniques relay on collecting ranging measurements, and distance bounding and authenticated ranging provide a means of doing this a degree of security. However, the security obtained is not perfect, as we shall see, and the trust assumptions must be considered carefully when deciding how to use them. In this work we concentrate on the application of distance bounding and authenticated ranging to secure localization. We are interested in the case in which only part of the network (perhaps restricted to one geographical portion of the network) knows its location, and location information must be propagated securely to other parts of the network. We are interested in questions like such as the following: How is a node able to determine that another node may be lying about its location? Does it make sense to try to authenticate ranging information of even nodes that lie, or at somewhat less cost, only try to authenticate ranging information of honest nodes? How can we best employ different techniques for securing ranging information? The rest of the paper is organized as follows. We begin with a survey of distance bounding and range authentication protocols, paying particular

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007