Distance Bounding: A Practical Security Solution for Real-Time Location Systems

被引:50
作者
Abu-Mahfouz, Adnan [1 ]
Hancke, Gerhard P. [1 ,2 ]
机构
[1] Univ Pretoria, ZA-0002 Pretoria, Gauteng, South Africa
[2] Univ London, ISG, Egham TW20 0EX, Surrey, England
关键词
Distance-bounding; proximity authentication; real-time location; RFID; secure neighbor detection (SND); secure ranging; wireless; SUPPLY CHAIN; ATTACKS; CHALLENGES; PROTOCOL;
D O I
10.1109/TII.2012.2218252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.
引用
收藏
页码:16 / 27
页数:12
相关论文
共 71 条
[1]  
Abu-Mahfouz A. M., 2012, INTERSCI J SENSOR NE
[2]  
[Anonymous], 2010, P USENIX SEC S
[3]  
[Anonymous], C THEOR APPL CRYPT
[4]  
[Anonymous], 2007, P 1 INT EURASIP WORK
[5]   A framework for analyzing RFID distance bounding protocols [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Kardas, Suleyman ;
Lauradoux, Cedric ;
Martin, Benjamin .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) :289-317
[6]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5922, P290, DOI 10.1007/978-3-642-10628-6_20
[7]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[8]  
Barker E., 2010, Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes, NIST SP 800-131
[9]   Secure localization algorithms for wireless sensor networks [J].
Boukerche, Azzedine ;
Oliveira, Horacio A. B. F. ;
Nakamura, Eduardo F. ;
Loureiro, Antonio A. F. .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :96-101
[10]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344