Location verification using secure distance bounding protocols

Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We fo...

Full description

Saved in:
Bibliographic Details
Published inIEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 pp. 7 pp. - 840
Main Authors Singelee, D., Preneel, B.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text
ISBN0780394658
9780780394650
ISSN2155-6806
DOI10.1109/MAHSS.2005.1542879

Cover

Loading…
Abstract Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme
AbstractList Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme
Author Singelee, D.
Preneel, B.
Author_xml – sequence: 1
  givenname: D.
  surname: Singelee
  fullname: Singelee, D.
  organization: ESAT-COSIC, Leuven
– sequence: 2
  givenname: B.
  surname: Preneel
  fullname: Preneel, B.
  organization: ESAT-COSIC, Leuven
BookMark eNotj0FLAzEUhANWsK39A3rZP7DryybZvFyEUtQKKx7ae0mybyVSk7LZFfz3VuxchuGDYWbBZjFFYuyOQ8U5mIe39Xa3q2oAVXEla9Tmii1AIwgjG4UzNq-5UmWD0NywVc6fcJZUQhucs8c2eTuGFItvGkIfLmHKIX4Umfw0UNGFPNroqXBpit0fOA1pTD4d8y277u0x0-riS7Z_ftpvtmX7_vK6WbdlMDCWznRONtpxRRo0gTekjUJ0njcSXYemFiisU3Re7CxQL8n0NdrOCac0iSW7_68NRHQ4DeHLDj-Hy1vxC8fLTA0
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/MAHSS.2005.1542879
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 840
ExternalDocumentID 1542879
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i90t-b9db467b15e707e0c9e79588bc1648bd892383ab5e946ba0ef4e9f28adb3b57e3
IEDL.DBID RIE
ISBN 0780394658
9780780394650
ISSN 2155-6806
IngestDate Tue Aug 26 19:53:15 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-b9db467b15e707e0c9e79588bc1648bd892383ab5e946ba0ef4e9f28adb3b57e3
ParticipantIDs ieee_primary_1542879
PublicationCentury 2000
PublicationDate 20050000
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 20050000
PublicationDecade 2000
PublicationTitle IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005
PublicationTitleAbbrev MAHSS
PublicationYear 2005
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000453798
ssj0001286290
Score 1.5915686
Snippet Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard)...
SourceID ieee
SourceType Publisher
StartPage 7 pp.
SubjectTerms Authentication
Biometrics
Global Positioning System
Immune system
IP networks
Printers
Protocols
Security
Switches
Terrorism
Title Location verification using secure distance bounding protocols
URI https://ieeexplore.ieee.org/document/1542879
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvTioxXf5ODRtNtsdrN7EUQsRawIrdBb2U0mIkIjNrn4653dpPWBB2_ZJCSbYZL55svMtwAXzAiZ85TRi0S5ScxRhyaRhrKUoYlNzlIpXe_w5EGOn-K7uZi34HLTC4OIvvgM-27T_8vPirRyVNmAwj0BfN2GNrlZ3au14VMImvCkSR1qfoWwuqdYKKiJUComfdauGNcxhd1GfGc9ZuuGGqYHk-vxdFrTLc0dfyy94iPPaAcm6znXBSev_aq0_fTjl5zjfx9qF3pfPX7B4yZ67UELl_uw_U2esAtX90VN6AXk766kqB64UvnnYOWIegwyhz_dtaxbn8kdcMoPBbnXqgez0e3sZhw26y2EL5qVodWZpc-mHQpMWIIs1ZhooZRNKaVSNlOEBRU3ViAZzBqGeYw6j5TJLLciQX4AnWWxxEMILFIWZRiPDCe4lWYq1gqTmM43kYjy_Ai6zhCLt1pRY9HY4Pjv3Sew5QVTPfFxCp3yvcIzggKlPfc-8AmIsqwP
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEN7UelAvPlrjWw4epd2yu7B7MTHGBrU0Jq1Jb80uDMaYFGPpxV_v7ELrIx68sUBgmQx833zMzBJyQbUIc5ZSfJEwNuEMlK-jUGOU0tNc5zQNQ1s7nAzD-InfT8SkQS5XtTAA4JLPoGM33b_8rEgXVirrItwjwVdrZB1xn4uqWmulqCA5YVEdPFQKC7J1J7IgrAk_lDR0cbukTHEE3rr9znJMlyU1VHWT63g0qgSX-p4_Fl9x2NPfJsly1lXKyWtnUZpO-vGroeN_H2uHtL-q_LzHFX7tkgbM9sjWtwaFLXI1KCpJz0OPt0lF1cAmyz97cyvVg5dZBmqvZewKTfaA7f1QoIPN22Tcvx3fxH694oL_omjpG5UZ_HCanoCIRkBTBZESUpoUgyppMolsUDJtBKDBjKaQc1B5IHVmmBERsH3SnBUzOCCeAYyjNGWBZki40kxyJSHieL4ORJDnh6RlDTF9q3pqTGsbHP29-5xsxONkMB3cDR-OyaZrn-pkkBPSLN8XcIrEoDRnzh8-AcLYr1w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+International+Conference+on+Mobile+Adhoc+and+Sensor+Systems+Conference%2C+2005&rft.atitle=Location+verification+using+secure+distance+bounding+protocols&rft.au=Singelee%2C+D.&rft.au=Preneel%2C+B.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780394650&rft.issn=2155-6806&rft.spage=7+pp.&rft.epage=840&rft_id=info:doi/10.1109%2FMAHSS.2005.1542879&rft.externalDocID=1542879
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-6806&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-6806&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-6806&client=summon