@affitz

Location verification using secure distance bounding protocols

, and . IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS), page 7 pp.-840. IEEE, (November 2005)
DOI: 10.1109/MAHSS.2005.1542879

Abstract

Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be used to authenticate devices and users. We focus on how a provers can securely show that (s)he is within a certain distance to a verifier. Brands and Chaum proposed the distance bounding protocol as a secure solution for this problem. However, this protocol is vulnerable to a so-called "terrorist fraud attack". In this paper, we explain how to modify the distance bounding protocol to make it resistant to this kind of attacks. Recently, two other secure distance bounding protocols were published. We discuss the properties of these protocols and show how to use it as a building block in a location verification scheme

Description

IEEE Xplore Abstract - Location verification using secure distance bounding protocols

Links and resources

Tags