Proceedings of the 8th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2015
DOI: 10.1145/2766498.2766516
|View full text |Cite
|
Sign up to set email alerts
|

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding

Abstract: Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB + protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been shown that the HB + protocol as well as many of its variants are vulnerable to a simple man-in-the-middle attack. We d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
2
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…tag reader back end server Figure 1 A system model of RFID systems [7] Although, RFID technology is developing rapidly and providing comfort for users, deficiency of supplying the necessary privacy, will result in irreparable damages such as traceability, DoS and impersonation attacks [8] . Therefore, scholars have proposed protocols to provide security and privacy of users in RFID systems, which generally classify into four classes based on the deployed cryptographic functions [9] .…”
Section: Journal Of Communications and Information Networkmentioning
confidence: 99%
“…tag reader back end server Figure 1 A system model of RFID systems [7] Although, RFID technology is developing rapidly and providing comfort for users, deficiency of supplying the necessary privacy, will result in irreparable damages such as traceability, DoS and impersonation attacks [8] . Therefore, scholars have proposed protocols to provide security and privacy of users in RFID systems, which generally classify into four classes based on the deployed cryptographic functions [9] .…”
Section: Journal Of Communications and Information Networkmentioning
confidence: 99%
“…The HB+DB protocol . Depicted in Figure 2, the HB+DB protocol [15,16] uses two public parameters: η ∈ (0, 1/2) for LPN noise and the mean ψ ∈ [0,1/2] of a Bernoulli distribution for channel noise. The prover P and the verifier V share three k-bit keys x,y,z.…”
Section: The Hb + and Hb+db Protocolsmentioning
confidence: 99%
“…The HB+DB protocol [15,16] is essentially a white-box composition of an authentication protocol (i.e., HB + ) and a proximity-checking phase. This section shows, however, that HB+DB provides neither secure authentication, nor secure distance bounding.…”
Section: Hb+db's Security Shortcomingsmentioning
confidence: 99%
See 2 more Smart Citations