Using Physical Context-Based Authentication against External Attacks: Models and Protocols

被引:3
|
作者
Melo, Wilson S., Jr. [1 ]
Machado, Raphael C. S. [1 ,2 ]
Carmo, Luiz F. R. C. [1 ,3 ]
机构
[1] Natl Inst Metrol Qual & Technol, Rio De Janeiro, RJ, Brazil
[2] Fed Ctr Technol Educ, Rio De Janeiro, RJ, Brazil
[3] Univ Fed Rio de Janeiro, Rio De Janeiro, RJ, Brazil
关键词
SECURITY; LAYER; INTERNET; THINGS;
D O I
10.1155/2018/6590928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern systems are increasingly dependent on the integration of physical processes and information technologies. This trend is remarkable in applications involving sensor networks, cyberphysical systems, and Internet of Things. Despite its complexity, such integration results in physical context information that can be used to improve security, especially authentication. In this paper, we show that entities sharing the same physical context can use it for establishing a secure communication channel and protecting each other against external attacks. We present such approach proposing a theoretical model for generating unique bitstreams. Two different protocols are suggested. Each one is evaluated using probabilistic analysis and simulation. In the end, we implement the authentication mechanism in a case study using networks radio signal as physical event generator. The results demonstrate the performance of each of the protocols and their suitability for applications in real world.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Context-Based Adaptive and Responsive Authentication
    Lenzini, Gabriele
    Hulsebosch, Bob
    [J]. ERCIM NEWS, 2007, (71): : 34 - 35
  • [2] Revisiting Context-Based Authentication in loT
    Miettinen, Markus
    Thien Duc Nguyen
    Sadeghi, Ahmad-Reza
    Asokan, N.
    [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [3] Multimodal Context-Based Continuous Authentication
    Aathreya, Saandeep
    Chaudhary, Meghna
    Neal, Tempestt
    Canavan, Shaun
    [J]. 2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [4] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [5] Strengthening password-based authentication protocols against online dictionary attacks
    Wang, P
    Kim, Y
    Kher, V
    Kwon, T
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 17 - 32
  • [6] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [7] A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks
    Lakhdhar, Yosra
    Rekhis, Slim
    Boudriga, Noureddine
    [J]. UBIQUITOUS NETWORKING, UNET 2018, 2018, 11277 : 295 - 307
  • [8] Context-based authentication and transport of cultural assets
    Leonardo Mostarda
    Changyu Dong
    Naranker Dulay
    [J]. Personal and Ubiquitous Computing, 2010, 14 : 321 - 334
  • [9] Context-based authentication and transport of cultural assets
    Mostarda, Leonardo
    Dong, Changyu
    Dulay, Naranker
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2010, 14 (04) : 321 - 334
  • [10] ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX
    Wang Shaohui
    Liu Sujuan
    [J]. Journal of Electronics(China), 2013, 30 (01) : 33 - 39