HB+DB: Distance bounding meets human based authentication

نویسندگان

  • Elena Pagnin
  • Anjia Yang
  • Qiao Hu
  • Gerhard P. Hancke
  • Aikaterini Mitrokotsa
چکیده

Authentication for resource-constrained devices is seen as one of themajor challenges in current wireless communication networks. The HB protocol by Juels and Weis provides device authentication based on the learning parity with noise (LPN) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work has focused on modifying the cryptographic properties of the original protocol tomitigate this problem.We propose that this attack could bemitigated using physical layermeasures fromdistance-bounding protocols and simple modifications to devices’ radio receivers. We take the HB as a reference protocol and combine it with distance-bounding techniques. This hybrid solution, the HBDB protocol is shown to provide resistance against the man-in-the-middle attacks on HBas a result of the additional physical-layer mechanisms. We analyze the security of the proposed HBDB protocol against active man-in-the-middle attacks and present experiments showing how it is practically possible to limit the success of a practical man-inthe-middle attack. We also briefly discuss the possibility that HBDB could provide some resistance to basic threats scenarios meant to be mitigated by distance-bounding protocols. We make a practical implementation to verify that our proposed method is feasible. Finally, we discuss a proof-of-concept channel for our scheme implemented on a platform equivalent in resources to a contactless smart card/NFC device. © 2016 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding

Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been sh...

متن کامل

Vssdb: A Verifiable Secret-Sharing Distance-Bounding Protocol

Terrorist fraud is a class of relay attacks against distancebounding (DB) protocols in which a distant malicious prover colludes with an attacker located in a verifier’s proximity when authenticating. Existing DB protocols resisting such attacks are designed to be lightweight and thus symmetric, relying on a secret shared by the prover and the verifier. Recently, several asymmetric distance-bou...

متن کامل

Towards Quantum Distance Bounding Protocols

Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the pr...

متن کامل

Eliminating rouge femtocells based on distance bounding protocol and geographic information

Recently, femtocell solutions have been attracting increasing attention since coverage for broadband radios can effectively eliminate wireless notspots. To restrict malicious subscribers from accessing femtocells, 3G/WiMAX standards introduce an access control strategy, called Closed Subscriber Group (CSG). However, CSG only prevents malicious clients, but not rouge femtocells. In 2009, Han et ...

متن کامل

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions

Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-res...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Future Generation Comp. Syst.

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2018