Short : HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

6 Scopus Citations
View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationProceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
PublisherAssociation for Computing Machinery, Inc
ISBN (print)9781450336239
Publication statusPublished - 22 Jun 2015

Conference

Title8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
PlaceUnited States
CityNew York
Period22 - 26 June 2015

Abstract

Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB+ protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been shown that the HB+ protocol as well as many of its variants are vulnerable to a simple man-in-the-middle attack. We demonstrate that this attack could be mitigated using physical layer measures from distance-bounding and simple modifications to devices' radio receivers. Our hybrid solution (HB+DB) is shown to provide both effective distance-bounding using a lightweight HB+-based response function, and resistance against the man-in-the-middle attack to HB+. We provide experimental evaluation of our results as well as a brief discussion on practical requirements for secure implementation.

Research Area(s)

  • Distance bounding, HB-protocol, HB+, Physical layer security

Citation Format(s)

Short: HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. / Pagnin, Elena; Yang, Anjia; Hancke, Gerhard et al.
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. Association for Computing Machinery, Inc, 2015. a3.

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review