首页> 外文会议>IFIP WG 11.2 International Conference on Information Security Theory and Practice >Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?
【24h】

Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?

机译:重新审视双跳距离限定协议:你真的很接近吗?

获取原文

摘要

The emergence of ubiquitous computing has led to multiple heterogeneous devices with increased connectivity. In this communication paradigm everything is inter-connected and proximity-based authentication is an indispensable requirement in multiple applications including contactless payments and access control to restricted services/places. Distance-bounding (DB) protocols is the main approach employed to achieve accurate proximity-based authentication. Traditional distance-bounding requires that the prover and the verifier are in each other's communication range. Recently, Pagnin et al. have proposed a two-hop DB protocol that allows proximity-based authentication, when the prover and the verifier need to rely on an intermediate untrusted party (linker). In this paper, we investigate further the topic of two-hop distance-bounding. We analyse the security of the Pagnin et al. protocol for internal adversaries and we investigate the impact of the position of the linker in the distance-bounding process. We propose a new two-hop DB protocol that is more lightweight and avoids the identified problems. Finally, we extend the protocol to the multi-hop setting and we provide a detailed security analysis for internal adversaries.
机译:无处不在的计算的出现导致多个异构器件,其连接增加。在此通信范例中,所有内容都是连接间的,基于接近的身份验证是多个应用程序中不可或缺的要求,包括非接触式支付和访问控制到受限服务/地点。距离限定(DB)协议是用于实现准确的基于近距离的认证的主要方法。传统的距离限制要求先词和验证者在彼此的通信范围内。最近,Pagnin等人。已经提出了一种允许基于邻近的身份验证的两跳DB协议,当寄存器和验证者需要依赖中间不受信任的方(链接器)时。在本文中,我们进一步调查了两跳距离限制的主题。我们分析了Pagnin等人的安全性。内部对手的议定书,我们研究了接头位置在距离限定过程中的影响。我们提出了一种新的双跳DB协议,更轻质,避免了所识别的问题。最后,我们将协议扩展到多跳设置,我们为内部对手提供了详细的安全分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号