Cargando…

A new secure authentication based distance bounding protocol

Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, howe...

Descripción completa

Detalles Bibliográficos
Autores principales: Sultan, Ahmed Raheeq, Rashid, Imran, Khan, Fawad, Tahir, Shahzaib, Pasha, Maruf, Sultan, Aiman
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114813/
https://www.ncbi.nlm.nih.gov/pubmed/34013037
http://dx.doi.org/10.7717/peerj-cs.517
_version_ 1783691122928779264
author Sultan, Ahmed Raheeq
Rashid, Imran
Khan, Fawad
Tahir, Shahzaib
Pasha, Maruf
Sultan, Aiman
author_facet Sultan, Ahmed Raheeq
Rashid, Imran
Khan, Fawad
Tahir, Shahzaib
Pasha, Maruf
Sultan, Aiman
author_sort Sultan, Ahmed Raheeq
collection PubMed
description Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements.
format Online
Article
Text
id pubmed-8114813
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-81148132021-05-18 A new secure authentication based distance bounding protocol Sultan, Ahmed Raheeq Rashid, Imran Khan, Fawad Tahir, Shahzaib Pasha, Maruf Sultan, Aiman PeerJ Comput Sci Cryptography Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. PeerJ Inc. 2021-05-06 /pmc/articles/PMC8114813/ /pubmed/34013037 http://dx.doi.org/10.7717/peerj-cs.517 Text en ©2021 Sultan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Cryptography
Sultan, Ahmed Raheeq
Rashid, Imran
Khan, Fawad
Tahir, Shahzaib
Pasha, Maruf
Sultan, Aiman
A new secure authentication based distance bounding protocol
title A new secure authentication based distance bounding protocol
title_full A new secure authentication based distance bounding protocol
title_fullStr A new secure authentication based distance bounding protocol
title_full_unstemmed A new secure authentication based distance bounding protocol
title_short A new secure authentication based distance bounding protocol
title_sort new secure authentication based distance bounding protocol
topic Cryptography
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114813/
https://www.ncbi.nlm.nih.gov/pubmed/34013037
http://dx.doi.org/10.7717/peerj-cs.517
work_keys_str_mv AT sultanahmedraheeq anewsecureauthenticationbaseddistanceboundingprotocol
AT rashidimran anewsecureauthenticationbaseddistanceboundingprotocol
AT khanfawad anewsecureauthenticationbaseddistanceboundingprotocol
AT tahirshahzaib anewsecureauthenticationbaseddistanceboundingprotocol
AT pashamaruf anewsecureauthenticationbaseddistanceboundingprotocol
AT sultanaiman anewsecureauthenticationbaseddistanceboundingprotocol
AT sultanahmedraheeq newsecureauthenticationbaseddistanceboundingprotocol
AT rashidimran newsecureauthenticationbaseddistanceboundingprotocol
AT khanfawad newsecureauthenticationbaseddistanceboundingprotocol
AT tahirshahzaib newsecureauthenticationbaseddistanceboundingprotocol
AT pashamaruf newsecureauthenticationbaseddistanceboundingprotocol
AT sultanaiman newsecureauthenticationbaseddistanceboundingprotocol