Location verification using secure distance bounding protocols
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We fo...
Saved in:
Published in | IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 pp. 7 pp. - 840 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2005
|
Subjects | |
Online Access | Get full text |
ISBN | 0780394658 9780780394650 |
ISSN | 2155-6806 |
DOI | 10.1109/MAHSS.2005.1542879 |
Cover
Loading…
Abstract | Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme |
---|---|
AbstractList | Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme |
Author | Singelee, D. Preneel, B. |
Author_xml | – sequence: 1 givenname: D. surname: Singelee fullname: Singelee, D. organization: ESAT-COSIC, Leuven – sequence: 2 givenname: B. surname: Preneel fullname: Preneel, B. organization: ESAT-COSIC, Leuven |
BookMark | eNotj0FLAzEUhANWsK39A3rZP7DryybZvFyEUtQKKx7ae0mybyVSk7LZFfz3VuxchuGDYWbBZjFFYuyOQ8U5mIe39Xa3q2oAVXEla9Tmii1AIwgjG4UzNq-5UmWD0NywVc6fcJZUQhucs8c2eTuGFItvGkIfLmHKIX4Umfw0UNGFPNroqXBpit0fOA1pTD4d8y277u0x0-riS7Z_ftpvtmX7_vK6WbdlMDCWznRONtpxRRo0gTekjUJ0njcSXYemFiisU3Re7CxQL8n0NdrOCac0iSW7_68NRHQ4DeHLDj-Hy1vxC8fLTA0 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/MAHSS.2005.1542879 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 840 |
ExternalDocumentID | 1542879 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i90t-b9db467b15e707e0c9e79588bc1648bd892383ab5e946ba0ef4e9f28adb3b57e3 |
IEDL.DBID | RIE |
ISBN | 0780394658 9780780394650 |
ISSN | 2155-6806 |
IngestDate | Tue Aug 26 19:53:15 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-b9db467b15e707e0c9e79588bc1648bd892383ab5e946ba0ef4e9f28adb3b57e3 |
ParticipantIDs | ieee_primary_1542879 |
PublicationCentury | 2000 |
PublicationDate | 20050000 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 20050000 |
PublicationDecade | 2000 |
PublicationTitle | IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005 |
PublicationTitleAbbrev | MAHSS |
PublicationYear | 2005 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000453798 ssj0001286290 |
Score | 1.5915686 |
Snippet | Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard)... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 7 pp. |
SubjectTerms | Authentication Biometrics Global Positioning System Immune system IP networks Printers Protocols Security Switches Terrorism |
Title | Location verification using secure distance bounding protocols |
URI | https://ieeexplore.ieee.org/document/1542879 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvTioxXf5ODRtNtsdrN7EUQsRawIrdBb2U0mIkIjNrn4653dpPWBB2_ZJCSbYZL55svMtwAXzAiZ85TRi0S5ScxRhyaRhrKUoYlNzlIpXe_w5EGOn-K7uZi34HLTC4OIvvgM-27T_8vPirRyVNmAwj0BfN2GNrlZ3au14VMImvCkSR1qfoWwuqdYKKiJUComfdauGNcxhd1GfGc9ZuuGGqYHk-vxdFrTLc0dfyy94iPPaAcm6znXBSev_aq0_fTjl5zjfx9qF3pfPX7B4yZ67UELl_uw_U2esAtX90VN6AXk766kqB64UvnnYOWIegwyhz_dtaxbn8kdcMoPBbnXqgez0e3sZhw26y2EL5qVodWZpc-mHQpMWIIs1ZhooZRNKaVSNlOEBRU3ViAZzBqGeYw6j5TJLLciQX4AnWWxxEMILFIWZRiPDCe4lWYq1gqTmM43kYjy_Ai6zhCLt1pRY9HY4Pjv3Sew5QVTPfFxCp3yvcIzggKlPfc-8AmIsqwP |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEN7UelAvPlrjWw4epd2yu7B7MTHGBrU0Jq1Jb80uDMaYFGPpxV_v7ELrIx68sUBgmQx833zMzBJyQbUIc5ZSfJEwNuEMlK-jUGOU0tNc5zQNQ1s7nAzD-InfT8SkQS5XtTAA4JLPoGM33b_8rEgXVirrItwjwVdrZB1xn4uqWmulqCA5YVEdPFQKC7J1J7IgrAk_lDR0cbukTHEE3rr9znJMlyU1VHWT63g0qgSX-p4_Fl9x2NPfJsly1lXKyWtnUZpO-vGroeN_H2uHtL-q_LzHFX7tkgbM9sjWtwaFLXI1KCpJz0OPt0lF1cAmyz97cyvVg5dZBmqvZewKTfaA7f1QoIPN22Tcvx3fxH694oL_omjpG5UZ_HCanoCIRkBTBZESUpoUgyppMolsUDJtBKDBjKaQc1B5IHVmmBERsH3SnBUzOCCeAYyjNGWBZki40kxyJSHieL4ORJDnh6RlDTF9q3pqTGsbHP29-5xsxONkMB3cDR-OyaZrn-pkkBPSLN8XcIrEoDRnzh8-AcLYr1w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+International+Conference+on+Mobile+Adhoc+and+Sensor+Systems+Conference%2C+2005&rft.atitle=Location+verification+using+secure+distance+bounding+protocols&rft.au=Singelee%2C+D.&rft.au=Preneel%2C+B.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780394650&rft.issn=2155-6806&rft.spage=7+pp.&rft.epage=840&rft_id=info:doi/10.1109%2FMAHSS.2005.1542879&rft.externalDocID=1542879 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-6806&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-6806&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-6806&client=summon |