Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme
%0 Conference Paper
%1 Singelee05
%A Singelee, D.
%A Preneel, B.
%B IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS)
%D 2005
%I IEEE
%K location security verification wireless
%P 7 pp.-840
%R 10.1109/MAHSS.2005.1542879
%T Location verification using secure distance bounding protocols
%U http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1542879&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1542879
%X Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme
@inproceedings{Singelee05,
abstract = {Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme},
added-at = {2014-11-10T15:26:37.000+0100},
author = {Singelee, D. and Preneel, B.},
biburl = {https://www.bibsonomy.org/bibtex/2a73e99a3bd07a9a1fc245b3c982584d2/affitz},
booktitle = {IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS)},
description = {IEEE Xplore Abstract - Location verification using secure distance bounding protocols},
doi = {10.1109/MAHSS.2005.1542879},
interhash = {09aabe5fac9c9c1ee5de692f42d20f6b},
intrahash = {a73e99a3bd07a9a1fc245b3c982584d2},
keywords = {location security verification wireless},
month = nov,
pages = {7 pp.-840},
publisher = {IEEE},
timestamp = {2014-11-10T15:26:37.000+0100},
title = {Location verification using secure distance bounding protocols},
url = {http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1542879&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1542879},
year = 2005
}