Int. J. of Ad Hoc and Ubiquitous Computing   »   2015 Vol.20, No.1

 

 

Title: An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel

 

Authors: Hoda Jannati; Abolfazl Falahati

 

Addresses:
Department of Electrical Engineering (DCCS Lab), Iran University of Science and Technology, Tehran 1684613114, Iran
Department of Electrical Engineering (DCCS Lab), Iran University of Science and Technology, Tehran 1684613114, Iran

 

Abstract: Distance bounding protocols have been suggested to protect an RFID communication system against relay attack. In such protocols, a verifier establishes an upper bound for the physical distance between a user and itself as well as authenticating the user. Recently, mutual distance bounding protocols in which both communication parties play not only as a user but also as a verifier have been proposed to be deployed for secure positioning protocols. In this paper, the performance of the existing mutual distance bounding protocols is analysed over a noisy communication channel. The analytic results show that these protocols provide a much higher rejection probability of a valid user due to channel errors than distance bounding protocols. Furthermore, a novel method is proposed to convert every distance bounding protocol into a mutual distance bounding protocol. Within this method, for each one of the two communication parties, the produced mutual distance bounding protocol provides the performance and security level exactly equal to those of its own associated distance bounding protocol at the same noisy environment, without transmitting any extra messages at the end of the protocol.

 

Keywords: mutual distance bounding protocol; distance fraud attacks; mafia fraud attacks; relay attacks; false-accept probability; false-reject probability; rapid bit exchange; noisy communication channels; RFID communication; radio frequency identification.

 

DOI: 10.1504/IJAHUC.2015.071658

 

Int. J. of Ad Hoc and Ubiquitous Computing, 2015 Vol.20, No.1, pp.1 - 16

 

Available online: 14 Sep 2015

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article