HB+DB: Distance bounding meets human based authentication
نویسندگان
چکیده
Authentication for resource-constrained devices is seen as one of themajor challenges in current wireless communication networks. The HB protocol by Juels and Weis provides device authentication based on the learning parity with noise (LPN) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work has focused on modifying the cryptographic properties of the original protocol tomitigate this problem.We propose that this attack could bemitigated using physical layermeasures fromdistance-bounding protocols and simple modifications to devices’ radio receivers. We take the HB as a reference protocol and combine it with distance-bounding techniques. This hybrid solution, the HBDB protocol is shown to provide resistance against the man-in-the-middle attacks on HBas a result of the additional physical-layer mechanisms. We analyze the security of the proposed HBDB protocol against active man-in-the-middle attacks and present experiments showing how it is practically possible to limit the success of a practical man-inthe-middle attack. We also briefly discuss the possibility that HBDB could provide some resistance to basic threats scenarios meant to be mitigated by distance-bounding protocols. We make a practical implementation to verify that our proposed method is feasible. Finally, we discuss a proof-of-concept channel for our scheme implemented on a platform equivalent in resources to a contactless smart card/NFC device. © 2016 Elsevier B.V. All rights reserved.
منابع مشابه
Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been sh...
متن کاملVssdb: A Verifiable Secret-Sharing Distance-Bounding Protocol
Terrorist fraud is a class of relay attacks against distancebounding (DB) protocols in which a distant malicious prover colludes with an attacker located in a verifier’s proximity when authenticating. Existing DB protocols resisting such attacks are designed to be lightweight and thus symmetric, relying on a secret shared by the prover and the verifier. Recently, several asymmetric distance-bou...
متن کاملTowards Quantum Distance Bounding Protocols
Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the pr...
متن کاملEliminating rouge femtocells based on distance bounding protocol and geographic information
Recently, femtocell solutions have been attracting increasing attention since coverage for broadband radios can effectively eliminate wireless notspots. To restrict malicious subscribers from accessing femtocells, 3G/WiMAX standards introduce an access control strategy, called Closed Subscriber Group (CSG). However, CSG only prevents malicious clients, but not rouge femtocells. In 2009, Han et ...
متن کاملA Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Future Generation Comp. Syst.
دوره 80 شماره
صفحات -
تاریخ انتشار 2018