277 research outputs found
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
Abstract Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes. This assignment helps to create centralized environment with subgroups, groups and hierarchies. Group or subgroups boundaries are limited through distance bounding protocols. Trust management plays the role of maintaining the relationship between nodes for long endeavor. Probability analysis of distance bounding protocol shows that the proposed approach is protected from mafia fraud, distance fraud, terrorist fraud, and distance hijacking attacks. The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (†50) increases the chances of these attacks whereas higher trust score protects the network from these attacks and improves the network performance as well. In performance analysis, it is observed that the Zone Routing Protocol (ZRP) outperforms the other MANET routing protocols in terms of network performance and security for the proposed scheme. However, the probabilistic analysis proves that it is still possible to control outliers in the network despite the new inserted defenses with trust management and limited resources
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
A Symbolic Framework to Analyse Physical Proximity in Security Protocols
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical proximity is a security goal of paramount importance. Formal methods have proved their usefulness when analysing standard security protocols. However, existing results and tools do not apply to e.g., distance bounding protocols that aims to ensure physical proximity between two entities. This is due in particular to the fact that existing models do not represent in a faithful way the locations of the participants, and the fact that transmission of messages takes time.
In this paper, we propose several reduction results: when looking for an attack, it is actually sufficient to consider a simple scenario involving at most four participants located at some specific locations. These reduction results allow one to use verification tools (e.g. ProVerif, Tamarin) developed for analysing more classical security properties. As an application, we analyse several distance bounding protocols, as well as a contactless payment protocol
Security of distance-bounding: A survey
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI linkDistance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features
Location Estimation and Recovery using 5G Positioning: Thwarting GNSS Spoofing Attacks
The availability of cheap GNSS spoofers can prevent safe navigation and
tracking of road users. It can lead to loss of assets, inaccurate fare
estimation, enforcing the wrong speed limit, miscalculated toll tax, passengers
reaching an incorrect location, etc. The techniques designed to prevent and
detect spoofing by using cryptographic solutions or receivers capable of
differentiating legitimate and attack signals are insufficient in detecting
GNSS spoofing of road users. Recent studies, testbeds, and 3GPP standards are
exploring the possibility of hybrid positioning, where GNSS data will be
combined with the 5G-NR positioning to increase the security and accuracy of
positioning. We design the Location Estimation and Recovery(LER) systems to
estimate the correct absolute position using the combination of GNSS and 5G
positioning with other road users, where a subset of road users can be
malicious and collude to prevent spoofing detection. Our Location Verification
Protocol extends the understanding of Message Time of Arrival Codes (MTAC) to
prevent attacks against malicious provers. The novel Recovery and Meta Protocol
uses road users' dynamic and unpredictable nature to detect GNSS spoofing. This
protocol provides fast detection of GNSS spoofing with a very low rate of false
positives and can be customized to a large family of settings. Even in a
(highly unrealistic) worst-case scenario where each user is malicious with a
probability of as large as 0.3, our protocol detects GNSS spoofing with high
probability after communication and ranging with at most 20 road users, with a
false positive rate close to 0. SUMO simulations for road traffic show that we
can detect GNSS spoofing in 2.6 minutes since its start under moderate traffic
conditions
- âŠ