Energy-efficient distance-bounding with residual charge computation

Real-time location systems are often required in industrial applications. In addition to securely determining an item's location, these systems also need to accommodate energy-limited tracking tokens. Distance-bounding protocols enable a Verifier to cryptographically determine an upper-bound on...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHUANG, Yunhui, YANG, Anjia, HANCKE, Gerhard, WONG, Duncan S., YANG, Guomin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7296
https://ink.library.smu.edu.sg/context/sis_research/article/8299/viewcontent/08067522.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8299
record_format dspace
spelling sg-smu-ink.sis_research-82992022-09-29T07:40:45Z Energy-efficient distance-bounding with residual charge computation ZHUANG, Yunhui YANG, Anjia HANCKE, Gerhard WONG, Duncan S. YANG, Guomin Real-time location systems are often required in industrial applications. In addition to securely determining an item's location, these systems also need to accommodate energy-limited tracking tokens. Distance-bounding protocols enable a Verifier to cryptographically determine an upper-bound on the physical distance to a Prover by measuring the round-trip time of specially designed challenge-response messages. This type of protocols serve as countermeasure to three common attacks on location-based systems and have been extensively studied with the goal of achieving optimal security bounds for the respective attacks. In this paper, we propose a new energy-efficient distance-bounding protocol that protects against all three common attacks in a distance-bounding scenario with improved security bounds. We provide a new approach to combining the response registers and Prover's key to determine responses. Furthermore, the protocol design allows offline pre-computation of the function $f$f used to determine the Prover's response registers. This results in faster protocol execution, the reader does not wait for the tag to compute any cryptographic function during the protocol execution, and also allows passive tokens to effectively use residual energy after the preceding transaction to compute response registers for the next protocol run. 2020-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7296 info:doi/10.1109/TETC.2017.2761702 https://ink.library.smu.edu.sg/context/sis_research/article/8299/viewcontent/08067522.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Distance bounding embedded hardware RFID security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Distance bounding
embedded hardware
RFID security
Information Security
spellingShingle Distance bounding
embedded hardware
RFID security
Information Security
ZHUANG, Yunhui
YANG, Anjia
HANCKE, Gerhard
WONG, Duncan S.
YANG, Guomin
Energy-efficient distance-bounding with residual charge computation
description Real-time location systems are often required in industrial applications. In addition to securely determining an item's location, these systems also need to accommodate energy-limited tracking tokens. Distance-bounding protocols enable a Verifier to cryptographically determine an upper-bound on the physical distance to a Prover by measuring the round-trip time of specially designed challenge-response messages. This type of protocols serve as countermeasure to three common attacks on location-based systems and have been extensively studied with the goal of achieving optimal security bounds for the respective attacks. In this paper, we propose a new energy-efficient distance-bounding protocol that protects against all three common attacks in a distance-bounding scenario with improved security bounds. We provide a new approach to combining the response registers and Prover's key to determine responses. Furthermore, the protocol design allows offline pre-computation of the function $f$f used to determine the Prover's response registers. This results in faster protocol execution, the reader does not wait for the tag to compute any cryptographic function during the protocol execution, and also allows passive tokens to effectively use residual energy after the preceding transaction to compute response registers for the next protocol run.
format text
author ZHUANG, Yunhui
YANG, Anjia
HANCKE, Gerhard
WONG, Duncan S.
YANG, Guomin
author_facet ZHUANG, Yunhui
YANG, Anjia
HANCKE, Gerhard
WONG, Duncan S.
YANG, Guomin
author_sort ZHUANG, Yunhui
title Energy-efficient distance-bounding with residual charge computation
title_short Energy-efficient distance-bounding with residual charge computation
title_full Energy-efficient distance-bounding with residual charge computation
title_fullStr Energy-efficient distance-bounding with residual charge computation
title_full_unstemmed Energy-efficient distance-bounding with residual charge computation
title_sort energy-efficient distance-bounding with residual charge computation
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/7296
https://ink.library.smu.edu.sg/context/sis_research/article/8299/viewcontent/08067522.pdf
_version_ 1770576306440765440