Revisiting Error-Correction in Precommitment Distance-Bounding Protocols

被引:1
|
作者
Zhang, Jingyi [1 ]
Yang, Anjia [2 ]
Hu, Qiao [3 ]
Hancke, Gerhard Petrus [1 ]
Liu, Zhe [4 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Error correction codes; Security; Terrorism; Systematics; Statistical analysis; Noise measurement; Distance-bounding (DB) protocol; relay attack;
D O I
10.1109/TII.2021.3134956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding (DB) protocols are used to verify the physical proximity of two devices. DB can be used to establish trusted ad-hoc connections in the industrial Internet-of-Things, e.g., nodes can verify they are deployed in the same location and monitoring the same piece of equipment. Thresholds and error correction codes (ECCs) are two methods to provide error-resilience for DB protocols working in noisy environments. However, the threshold method adds overheads and the ECC method increases the adversary success probability, compared to threshold, when implemented in precommitment DB protocols. In this article, we investigate the ECC method and demonstrate that designers can mitigate increased adversary success probability by using nonsystematic codes. To demonstrate this idea, we compare a prominent precommitment protocol by Brands and Chaum (BC) integrated with different types of ECCs with two existing error-resilience methods, showing how nonsystematic codes provide improved protocol security. Moreover, We further evaluate the BC protocol with nonsystematic ECCs and discuss how to configure protocols to minimize the protocol failure rate, while maintaining adequate attack success probability.
引用
收藏
页码:7097 / 7106
页数:10
相关论文
共 50 条
  • [41] ERROR-DETECTION AND ERROR-CORRECTION
    不详
    LECTURE NOTES IN CONTROL AND INFORMATION SCIENCES, 1987, 94 : 55 - 85
  • [42] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [43] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [44] Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
    Bosk, Daniel
    Bouget, Simon
    Buchegger, Sonja
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 147 - 166
  • [45] ERROR-CORRECTION FOR WIMS AND WUMS
    VANEIJL, C
    COHEN, G
    ZEMOR, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 539 : 159 - 170
  • [46] ERROR-CORRECTION IN FRENCH IMMERSION
    FROC, ML
    CANADIAN MODERN LANGUAGE REVIEW-REVUE CANADIENNE DES LANGUES VIVANTES, 1995, 51 (04): : 708 - 717
  • [47] Distance-bounding proof of knowledge to avoid real-time attacks
    Bussard, L
    Bagga, W
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
  • [48] Error-Correction of Multidimensional Bursts
    Etzion, Tuvi
    Yaakobi, Eitan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (03) : 961 - 976
  • [49] Error-correction of multidimensional bursts
    Yaakobi, Eitan
    Etzion, Lbvi
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1381 - 1385
  • [50] DECIMAL ERROR-CORRECTION - SOLUTION
    ANDREW, AM
    COMPUTER JOURNAL, 1975, 18 (03): : 284 - 285