4 research outputs found

    A framework for analyzing RFID distance bounding protocols

    Get PDF
    Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we introduce a unied framework that aims to improve analysis and design of distance bounding protocols. Our framework includes a thorough terminology about the frauds, adversary, and prover, thus disambiguating many misleading terms. It also explores the adversary's capabilities and strategies, and addresses the impact of the prover's ability to tamper with his device. It thus introduces some new concepts in the distance bounding domain as the black-box and white-box models, and the relation between the frauds with respect to these models. The relevancy and impact of the framework is nally demonstrated on a study case: Munilla-Peinado distance bounding protocol

    Yet Another Secure Distance-Bounding Protocol

    Get PDF
    Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect \emph{relay attacks}, also known as \emph{mafia fraud}. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new protocols have been proposed the last five years. In this paper, a new secure distance-bounding protocol is presented. It is self-contained and composable with other protocols for example for authentication or key-negotiation. It allows periodically execution and achieves better use of the communication channels by exchanging authenticated nonces. The proposed protocol becomes suitable for wider class of devices, since the resource requirements to the prover are relaxed

    Key Establishment Using Secure Distance Bounding Protocols

    No full text
    Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wireless ad-hoc networks. In this paper, we present an efficient key establishment protocol, based on the basic Diffie-Hellman protocol. It enables mutual device authentication through presence and establishes a session key between personal mobile devices which do not yet share any authenticated cryptographic material. Distance bounding protocols, which have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, are employed to determine an upperbound on the distance to another entity. Our solution only requires limited user-interaction: the user of a mobile device is expected to perform a visual verification within a small physical space

    Reliable and Energy Efficient Network Protocols for Wireless Body Area Networks

    Get PDF
    In a wireless Body Area Network (WBAN) various sensors are attached on clothing, on the body or are even implanted under the skin. The wireless nature of the network and the wide variety of sensors offers numerous new, practical and innovative applications. A motivating example can be found in the world of health monitoring. The sensors of the WBAN measure for example the heartbeat, the body temperature or record a prolonged electrocardiogram. Using a WBAN, the patient experiences a greater physical mobility and is no longer compelled to stay in a hospital. A WBAN imposes the networks some strict and specific requirements. The devices are tiny, leaving only limited space for a battery. It is therefore of uttermost importance to restrict the energy consumption in the network. A possible solution is the development of energy efficient protocols that regulate the communication between the radios. Further, it is also important to consider the reliability of the communication. The data sent contains medical information and one has to make sure that it is correctly received at the personal device. It is not allowed that a critical message gets lost. In addition, a WBAN has to support the heterogeneity of its devices. This thesis focuses on the development of energy efficient and reliable network protocols for WBANs. Considered solutions are the use of multi-hop communication and the improved interaction between the different network layers. Mechanisms to reduce the energy consumption and to grade up the reliability of the communication are presented. In a first step, the physical layer of the communication near the human body is studied and investigated. The probability of a connection between two nodes on the body is modeled and used to investigate which network topologies can be considered as the most energy efficient and reliable. Next, MOFBAN, a lightweight framework for network architecture is presented. Finally, CICADA is presented: a new cross layer protocol for WBANs that both handles channel medium access and routing
    corecore