A new secure authentication based distance bounding protocol

Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, howe...

Full description

Bibliographic Details
Main Authors: Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan
Format: Article
Language:English
Published: PeerJ Inc. 2021-05-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-517.pdf
id doaj-43a35dbbed2e4322828659cf15803ae0
record_format Article
spelling doaj-43a35dbbed2e4322828659cf15803ae02021-05-08T15:05:15ZengPeerJ Inc.PeerJ Computer Science2376-59922021-05-017e51710.7717/peerj-cs.517A new secure authentication based distance bounding protocolAhmed Raheeq Sultan0Imran Rashid1Fawad Khan2Shahzaib Tahir3Maruf Pasha4Aiman Sultan5Department of Information Security, National University of Sciences and Technology, Islamabad, PakistanDepartment of Information Security, National University of Sciences and Technology, Islamabad, PakistanDepartment of Information Security, National University of Sciences and Technology, Islamabad, PakistanDepartment of Information Security, National University of Sciences and Technology, Islamabad, PakistanDepartment of Information Technology, Bahauddin Zakariya University, Multan, PakistanDepartment of Information Security, National University of Sciences and Technology, Islamabad, PakistanNumerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements.https://peerj.com/articles/cs-517.pdfInformation leakageCryptographyPosition verificationMafia GraudKey exchange
collection DOAJ
language English
format Article
sources DOAJ
author Ahmed Raheeq Sultan
Imran Rashid
Fawad Khan
Shahzaib Tahir
Maruf Pasha
Aiman Sultan
spellingShingle Ahmed Raheeq Sultan
Imran Rashid
Fawad Khan
Shahzaib Tahir
Maruf Pasha
Aiman Sultan
A new secure authentication based distance bounding protocol
PeerJ Computer Science
Information leakage
Cryptography
Position verification
Mafia Graud
Key exchange
author_facet Ahmed Raheeq Sultan
Imran Rashid
Fawad Khan
Shahzaib Tahir
Maruf Pasha
Aiman Sultan
author_sort Ahmed Raheeq Sultan
title A new secure authentication based distance bounding protocol
title_short A new secure authentication based distance bounding protocol
title_full A new secure authentication based distance bounding protocol
title_fullStr A new secure authentication based distance bounding protocol
title_full_unstemmed A new secure authentication based distance bounding protocol
title_sort new secure authentication based distance bounding protocol
publisher PeerJ Inc.
series PeerJ Computer Science
issn 2376-5992
publishDate 2021-05-01
description Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, however, are still prone to several threats; mainly the Relay Attack (Terrorist and Mafia Fraud). In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. In Terrorist fraud, an attempt is made to extract the secret from the verifying entity, either by extracting the key from the message captured or by physically tempering the verifying/proving entity. Therefore the mitigation of these attacks needs to be done; as to not put computational overhead on the scheme. The paper presents a comprehensive and comparative performance analysis of twelve DB protocols based on defined metrics. It also proposes a protocol which incorporates the design elements needed for added security, is computationally easy to implement and resistant to most of the threats mentioned. Analysis of the protocol is carried out against the security requirements.
topic Information leakage
Cryptography
Position verification
Mafia Graud
Key exchange
url https://peerj.com/articles/cs-517.pdf
work_keys_str_mv AT ahmedraheeqsultan anewsecureauthenticationbaseddistanceboundingprotocol
AT imranrashid anewsecureauthenticationbaseddistanceboundingprotocol
AT fawadkhan anewsecureauthenticationbaseddistanceboundingprotocol
AT shahzaibtahir anewsecureauthenticationbaseddistanceboundingprotocol
AT marufpasha anewsecureauthenticationbaseddistanceboundingprotocol
AT aimansultan anewsecureauthenticationbaseddistanceboundingprotocol
AT ahmedraheeqsultan newsecureauthenticationbaseddistanceboundingprotocol
AT imranrashid newsecureauthenticationbaseddistanceboundingprotocol
AT fawadkhan newsecureauthenticationbaseddistanceboundingprotocol
AT shahzaibtahir newsecureauthenticationbaseddistanceboundingprotocol
AT marufpasha newsecureauthenticationbaseddistanceboundingprotocol
AT aimansultan newsecureauthenticationbaseddistanceboundingprotocol
_version_ 1721454920720187392