Revisiting Error-Correction in Precommitment Distance-Bounding Protocols

被引:1
|
作者
Zhang, Jingyi [1 ]
Yang, Anjia [2 ]
Hu, Qiao [3 ]
Hancke, Gerhard Petrus [1 ]
Liu, Zhe [4 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Error correction codes; Security; Terrorism; Systematics; Statistical analysis; Noise measurement; Distance-bounding (DB) protocol; relay attack;
D O I
10.1109/TII.2021.3134956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding (DB) protocols are used to verify the physical proximity of two devices. DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things, e.g., nodes can verify they are deployed in the same location and monitoring the same piece of equipment. Thresholds and error correction codes (ECCs) are two methods to provide error-resilience for DB protocols working in noisy environments. However, the threshold method adds overheads and the ECC method increases the adversary success probability, compared to threshold, when implemented in precommitment DB protocols. In this article, we investigate the ECC method and demonstrate that designers can mitigate increased adversary success probability by using nonsystematic codes. To demonstrate this idea, we compare a prominent precommitment protocol by Brands and Chaum (BC) integrated with different types of ECCs with two existing error-resilience methods, showing how nonsystematic codes provide improved protocol security. Moreover, We further evaluate the BC protocol with nonsystematic ECCs and discuss how to configure protocols to minimize the protocol failure rate, while maintaining adequate attack success probability.
引用
收藏
页码:7097 / 7106
页数:10
相关论文
共 50 条
  • [21] Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
    Pagnin, Elena
    Hancke, Gerhard
    Mitrokotsa, Aikaterini
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (07) : 1173 - 1176
  • [22] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [23] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94
  • [24] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [25] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] EFFICIENT HYBRID ARQ PROTOCOLS WITH ADAPTIVE FORWARD ERROR-CORRECTION
    KALLEL, S
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1994, 42 (2-4) : 281 - 289
  • [27] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [28] New Attacks and Secure Design for Anonymous Distance-Bounding
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    Akand, Mamunur
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 598 - 616
  • [29] The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al.
    Vladimir Belsky
    Anastasiia Chichaeva
    Vasily Shishkin
    Kirill Tsaregorodtsev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) : 485 - 495
  • [30] A Distance-Bounding Concept for Bilateral IEEE 802.15.4 Communication
    Wittwer, Joachim
    Kirsch, Fabian
    Vossiek, Martin
    IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS AND ELECTRONICS SYSTEMS (COMCAS 2009), 2009,