Cargando…
A new secure authentication based distance bounding protocol
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, howe...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114813/ https://www.ncbi.nlm.nih.gov/pubmed/34013037 http://dx.doi.org/10.7717/peerj-cs.517 |
_version_ | 1783691122928779264 |
---|---|
author | Sultan, Ahmed Raheeq Rashid, Imran Khan, Fawad Tahir, Shahzaib Pasha, Maruf Sultan, Aiman |
author_facet | Sultan, Ahmed Raheeq Rashid, Imran Khan, Fawad Tahir, Shahzaib Pasha, Maruf Sultan, Aiman |
author_sort | Sultan, Ahmed Raheeq |
collection | PubMed |
description | Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. |
format | Online Article Text |
id | pubmed-8114813 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-81148132021-05-18 A new secure authentication based distance bounding protocol Sultan, Ahmed Raheeq Rashid, Imran Khan, Fawad Tahir, Shahzaib Pasha, Maruf Sultan, Aiman PeerJ Comput Sci Cryptography Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements. PeerJ Inc. 2021-05-06 /pmc/articles/PMC8114813/ /pubmed/34013037 http://dx.doi.org/10.7717/peerj-cs.517 Text en ©2021 Sultan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Cryptography Sultan, Ahmed Raheeq Rashid, Imran Khan, Fawad Tahir, Shahzaib Pasha, Maruf Sultan, Aiman A new secure authentication based distance bounding protocol |
title | A new secure authentication based distance bounding protocol |
title_full | A new secure authentication based distance bounding protocol |
title_fullStr | A new secure authentication based distance bounding protocol |
title_full_unstemmed | A new secure authentication based distance bounding protocol |
title_short | A new secure authentication based distance bounding protocol |
title_sort | new secure authentication based distance bounding protocol |
topic | Cryptography |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114813/ https://www.ncbi.nlm.nih.gov/pubmed/34013037 http://dx.doi.org/10.7717/peerj-cs.517 |
work_keys_str_mv | AT sultanahmedraheeq anewsecureauthenticationbaseddistanceboundingprotocol AT rashidimran anewsecureauthenticationbaseddistanceboundingprotocol AT khanfawad anewsecureauthenticationbaseddistanceboundingprotocol AT tahirshahzaib anewsecureauthenticationbaseddistanceboundingprotocol AT pashamaruf anewsecureauthenticationbaseddistanceboundingprotocol AT sultanaiman anewsecureauthenticationbaseddistanceboundingprotocol AT sultanahmedraheeq newsecureauthenticationbaseddistanceboundingprotocol AT rashidimran newsecureauthenticationbaseddistanceboundingprotocol AT khanfawad newsecureauthenticationbaseddistanceboundingprotocol AT tahirshahzaib newsecureauthenticationbaseddistanceboundingprotocol AT pashamaruf newsecureauthenticationbaseddistanceboundingprotocol AT sultanaiman newsecureauthenticationbaseddistanceboundingprotocol |