Title :
Location verification using secure distance bounding protocols
Author :
Singelee, Dave ; Preneel, Bart
Author_Institution :
ESAT-COSIC, Leuven
Abstract :
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme
Keywords :
ad hoc networks; mobile radio; protocols; telecommunication security; device authentication; distance bounding protocols; location verification scheme; mobile ad-hoc networks; terrorist fraud attack; Authentication; Biometrics; Global Positioning System; IP networks; Immune system; Printers; Protocols; Security; Switches; Terrorism;
Conference_Titel :
Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
0-7803-9465-8
DOI :
10.1109/MAHSS.2005.1542879