• Corpus ID: 12808674

Range Authentication Protocols for Localization

@inproceedings{Meadows2007RangeAP,
  title={Range Authentication Protocols for Localization},
  author={Catherine A. Meadows and Paul F. Syverson},
  year={2007}
}
A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distance bounding protocols were originally proposed for the verification of proximity. More recently, they… 

Figures from this paper

References

SHOWING 1-10 OF 16 REFERENCES

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

It is shown that proposed distance-bounding protocols of Hu, Perrig and Johnson, Sastry, Shankar and Wagner, and Capkun and Hubaux are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits.

An RFID Distance Bounding Protocol

  • G. HanckeM. Kuhn
  • Computer Science
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
A new distance-bounding protocol based on ultra-wideband pulse communication is proposed, aimed at being implementable using only simple, asynchronous, low-power hardware in the token, particularly well suited for use in passive low-cost tokens, noisy environments and high-speed applications.

Secure Verification of Location Claims with Simultaneous Distance Modification

It is demonstrated that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device.

Secure verification of location claims

The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels

This work proposes integrity codes (I-codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material, and introduces a novel concept called "authentication through presence", whose broad applications include broadcast authentication, key establishment and navigation signal protection.

ROPE: robust position estimation in wireless sensor networks

It is shown that ROPE bounds the ability of an attacker to spoof sensors' locations, with relatively low density deployment of reference points, and is confirmed the robustness of ROPE against attacks analytically and via simulations.

Time synchronization attacks in sensor networks

A survey of the most common time synchronization protocols and outline the possible attacks on each protocol is given and how different sensor network applications that are affected by time synchronization attacks are discussed, and some countermeasures for these attack are proposed.

Secure positioning in wireless networks

This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.

Secure Localization with Hidden and Mobile Base Stations

NCCR-MICS/CL3 Reference LCA-CONF-2005-029 Record created on 2005-12-07, modified on 2017-05-12.

Distance bounding protocols: Authentication logic and collusion attacks

  • Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks,
  • 2007