Show simple item record

AuthorKleber, Stephandc.contributor.author
AuthorVan der Heijden, Rens W.dc.contributor.author
AuthorKopp, Henningdc.contributor.author
AuthorKargl, Frankdc.contributor.author
Date of accession2016-03-15T10:40:13Zdc.date.accessioned
Available in OPARU since2016-03-15T10:40:13Zdc.date.available
Year of creation2015dc.date.created
AbstractDistance bounding protocols (DBPs) aim to restrict the acceptable distance between the communication partners of a wireless communication. Despite numerous proposed protocols, recent analyses of DBPs have shown the majority of them to be susceptible to attacks that undermine certain aspects of the protocols´ security objectives. The most prominent of the unsolved security problems of DBPs is terrorist fraud. This type of attack utilizes one of the legitimate prover devices´ collaboration to circumvent the DBP´s objective, allowing the attacker to pretend being in valid distance to the verifier. We show how terrorist fraud can be prevented by replacing shared secrets - commonly used in classical DBPs - by physical unclonable functions (PUFs). Our new approach can be integrated in all current DBPs with minor modifications to the prover hardware and protocol implementation. We present two variants of our scheme, one utilizing the established concept of strong PUFs, the other using so-called SIMPL systems. For both schemes, we discuss security properties, as well as implementation challenges.dc.description.abstract
Languageendc.language.iso
PublisherUniversität Ulmdc.publisher
ID of original publ.http://dx.doi.org/10.1109/NetSys.2015.7089068dc.relation.uri
LicenseStandard (ohne Print-On-Demand)dc.rights
Link to license texthttps://oparu.uni-ulm.de/xmlui/license_opod_v1dc.rights.uri
KeywordDistance boundingdc.subject
KeywordPhysical unclonable functions (PUFs)dc.subject
KeywordSecuritydc.subject
KeywordSIMPL systemsdc.subject
KeywordTerrorist frauddc.subject
Dewey Decimal GroupDDC 004 / Data processing & computer sciencedc.subject.ddc
LCSHComputer network protocolsdc.subject.lcsh
LCSHComputer securitydc.subject.lcsh
LCSHWireless communication systemsdc.subject.lcsh
TitleTerrorist fraud resistance of distance bounding protocols employing physical unclonable functionsdc.title
Resource typeBeitrag zu einer Konferenzdc.type
DOIhttp://dx.doi.org/10.18725/OPARU-3261dc.identifier.doi
URNhttp://nbn-resolving.de/urn:nbn:de:bsz:289-vts-99579dc.identifier.urn
GNDComputersicherheitdc.subject.gnd
FacultyFakultät für Ingenieurwissenschaften und Informatikuulm.affiliationGeneral
Citation of original publ.2015 International Conference and Workshops on Networked Systems (NetSys)uulm.citationOrigPub
Date of activation2016-03-09T13:41:11Zuulm.freischaltungVTS
Peer reviewjauulm.peerReview
DCMI TypeTextuulm.typeDCMI
VTS-ID9957uulm.vtsID
CategoryPublikationenuulm.category
Conference name2015 International Conference on Networked Systems (NetSys)uulm.conferenceName
Conference placeCottbusuulm.conferencePlace
Conference start date2015-03-09uulm.conferenceStartDate
Conference end date2015-03-12uulm.conferenceEndDate
University Bibliographyjauulm.unibibliographie


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record