首页> 美国卫生研究院文献>PeerJ Computer Science >A new secure authentication based distance bounding protocol
【2h】

A new secure authentication based distance bounding protocol

机译:基于新的安全认证距离边界协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements.
机译:在日常生活中使用许多系统,其中两个实体在一系列距离上彼此验证。所涉及的距离相对较小,但仍会记录攻击。引入距离界限(DB)协议以满足安全要求。然而,这些计划仍然容易出现几种威胁;主要是继电器攻击(恐怖主义和黑手党欺诈)。在黑手党欺诈中,尝试通过重放消息或通过帮助恶意密钥作为谚语被接受。在恐怖主义欺诈中,尝试通过从捕获的消息中提取键或通过物理回火验证/证明实体来提取验证实体的秘密来提取验证实体的秘密。因此,需要完成对这些攻击的缓解;至于在方案上没有计算计算开销。本文介绍了基于定义度量的十二个DB协议的全面和比较绩效分析。它还提出了一种协议,该协议包含增加安全性所需的设计元素,可以易于实现和抵抗所提到的大多数威胁。对安全要求进行协议的分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号