SlideShare a Scribd company logo
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.44-48
www.ijres.org 44 | Page
Real-Time Location Systems Security using Distance Bounding
Srikanth S P1
, Sunita Tiwari2
1
(Computer Science, MVJCE/VTU, Bangalore, India)
2
(Computer Science, MVJCE/VTU, Bangalore, India)
ABSTRACT: Traditional Authentication protocols, that run between a prover and a verifier, enable the
verifier to decide whether a prover is fraud or authenticate by using technique like password, smart card, but
location based attacks cannot be prevent using these techniques. Networks like Real Time Location System
(RTLS), Wireless, Mobile Adhoc Network (MANet) suffer location based attacks. Location based attacks
categories in distance fraud, mafia fraud, and terrorist fraud. Distance bounding technique is use for secure
neighbor detection in RTLS that cryptographically measure an upper bound for the physical distance between
two network devices. In this paper propose architecture for physical proximity or location verification of
devices, for all types of attacks and prevention technique to these location based attacks
Keywords – Distance bounding protocol, secure neighbor detection, RTLS
I. INTRODUCTION
An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover.
Distance-bounding is an authentication protocol prevent all three type of attacks, First is man -in -the- middle
attack (MITM) or relay attacks, where an adversary forwards information between the prover and verifier such
that neither honest party is aware of the attack[4]. Second, In distance attacks, a dishonest prover placed far
from the verifier and Third terrorist attacks, where dishonest prover provides some limited help to the adversary,
such that the adversary is able to authenticate to the honest verifier. However the prover should not forward any
information that allows the adversary to authenticate without the prover's help.
For secure Neighbor detection, a node in a network determines the secure neighbor detection and
identifies other nodes in its entire trusted network area. It is used various protocols for secure neighbor detection
including localization, directional antennas, RF fingerprinting, centralized system, location-based system. In
Real Time Location System (RTLS), neighbors are usually defined as nodes that lie within radio range of each
other [3]. In wireless communication, it is always assumed that devices are within the communication range and
that communication range is location limited, which implicitly proves physical proximity. Distance bounding
protocol properties is used with RFID tags. The most common RF tags is the ISO 14443 standard, which
describes two types of tags which operate at a frequency of 13.56 MHz The ISO 14443 standard describes HF
(high frequency) cards[4]. These cards operate at proximity, i.e., at around 10cm. Distance-bounding protocols
are not applicable for high frequency tags, but only implementable in systems with low-latency channels.
II. SCOPE OF PAPER
The scope of the paper is to detecting attacks such as man-in-the- middle attack, terrorist attack and
distance fraud. If an intruder comes in secure network and impose as a trusted entity, using the distance
bounding protocol we can discover fraud entity. So that the data transmitted by the prover can be receive only
by authenticated verifier not by the attacker who masquerades as the same identity of original node and to
eliminate the attack.
Communication involves two parties, a prover and a verifier, and provides the verifier with
cryptographic proof as to the maximum physical distance to the prover. The verifier relies exclusively on
information gained from executing the protocol with the prover. As the verifier requires a reliable and secure
estimate of the distance to the prover, distance-bounding protocols should be integrated into the underlying
communication channel. The security of the protocol therefore not only depends on the cryptographic
mechanisms but also on the physical attributes of the communication channel that are used to measure
proximity.
III. EXISTING SYSTEM
In conventional networks, authentication is often based upon password, secret key, and smart card or
biometric. A prover convincing a verifier of some assertion is a frequently recurring element in many
applications. The assertion is often the identity of the prover, but it can also be more general. Use GPS
coordinates in a location verification scheme, but this method cannot be used indoor [1]. Location information
does not always have to be so detailed; sometimes we are interested in the orientation. A lot of solutions can be
Real-Time Location Systems Security using Distance Bounding
www.ijres.org 45 | Page
found in the location verification scheme. There are however some drawbacks to this method. For example, it
cannot be used indoor. Location information does not always have to be so detailed in the distance, the
environment. Combining these pieces of information will enable to determine the exact position of the other
party.
The scenario of existing system has been practically demonstrated against real-world RFID systems.
The secure verification of a devices location relative to another device, so-called secure neighbor detection, is
therefore crucial to the secure and reliable operation of industrial real-time location applications.
IV. PROPOSED SYSTEM
In the proposed system, attackers attacks the system and find the IP address of nodes, initial location to
all the nodes and change the position of nodes by moves left and right. As our goal is not only to monitor real-
time locations, but also to retrieve history location proof information when needed, a location proof server is
necessary for storing the history records of the location proofs.
Figure-1: Architecture of Proposed System
It communicates directly with the prover nodes who submit their location proofs. As the source
identities of the location proofs are stored as pseudonyms, the location proof server is entrusted in the sense that
even though it is compromised and monitored by attackers, it is impossible for the attacker to reveal the real
source of the location proof .The node who needs to collect location proofs from its neighboring nodes. When a
location proof is needed at time, the prover will broadcast a location proof request to its neighboring nodes
through network. If no positive response is received, the prover will generate a dummy location proof and
submit it to the location proof server. A third-party user or an application who is authorized to verify a prover’s
location within a specific time period. The verifier usually has close relationship with the prover, for example
friends or colleagues, to be trusted enough to gain authorization.
The propagation speed of sound is much slower than that of radio waves. As a result, an attacker can
intercept the ultra sound communication and forward it over a faster radio or optical communication medium to
an accomplice closer to the verifier or prover, thereby reducing the time measurement and decreasing the
distance estimate. Radio Frequency (RF) channels are proposed as the channel for implementing distance
bounding systems [3]. A challenge-response authentication protocol is used in tight time-out constraint. As a
result, characteristics like attack resistance, resource requirements and execution time varies for each protocol.
The setup and verification stages can be transmitted via robust communication channels.
V. DISTANCE BOUNDING PROTOCOL
A Distance-bounding protocol determines an upper bound for the physical distance between two
communicating parties based on the Round-Trip-Time (RTT) of cryptographic challenge response pairs [1].
Verifying the physical location of a device using authentication protocol is an important security mechanism.
Distance bounding protocol aim to prove the proximity of two devices relative to each other. Brands and Chaum
proposed a distance bounding protocol that could be used to verify a device’s proximity cryptographically. This
design based on a channel where the prover can reply instantaneously to each single binary digit received from
the verifier. The number of challenge–response interactions is being determined by a chosen security parameter.
Distance bounding protocol not only in the one-to-one proximity identification context but also as building
blocks for secure location systems [3]. After correct execution of the distance bounding protocol, the verifier
Real-Time Location Systems Security using Distance Bounding
www.ijres.org 46 | Page
knows that an entity having data is in the trusted network.
Distance bounding protocol can be divided in three phase: the Commitment phase, the fast bit
Exchange phase and signing phase.
Figure-2: Distance Bounding Protocol (Brands and Chaum’s protocol s)[3]
VI. ATTACKS IN DISTANCE BOUNDING
Generally Three types of attacks that are discussed under Distance-Bounding: relay attack, terrorist attack
and distance attack.
A. Relay Attacks
Relay or Mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-
in-the-middle (MITM) between the reader and an honest tag located outside the neighbor.
Figure-3: Relay Fraud [2]
B. Terrorist Attacks
A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-
the-middle (MITM) between the reader and a dishonest tag located outside of the neighborhood, such that the
latter actively helps the adversary to maximize her attack success probability, without giving to her any
advantage for future attacks.
Figure-4: Terrorist Fraud [3]
C. Distance Attacks
A distance fraud is an attack where a dishonest and lonely prover supports to be in the neighborhood of
the verifier network.
Figure-5: Distance Fraud [3]
VerifierProver
VerifierProver
Fraud
Prover
Fraud
Verifier
VerifierProver Intruder
Real-Time Location Systems Security using Distance Bounding
www.ijres.org 47 | Page
VII. GENERALIZE SECURE NEIGHBOUR DETECTION MODEL
Following are the models for Secure Neighbor Detection
A. Directional Antenna
Directional antenna is an antenna which radiates in one or more directions allowing for increased
performance on transmit and receive and reduced interference from unwanted sources. Directional antennas
triangulate position using angle-of-arrival (AoA), which requires static reference nodes with antenna arrays
providing fixed reference directions. These nodes must also have synchronized clocks to ensure that a
transmission was made to multiple reference nodes at the same time [3].
B. Centralized Approaches
In Centralized approach we assume that there are many entities that contribute data on centralized
system, from where system can check for suspicious node presence by creating and analyzing system-wide
entity model [2]. This model work effectively when numbers of entities are many in numbers, not for networks
like that use point-to-point RFID link or device localization using RTLS with only three reference nodes.
C. RF Fingerprinting
Radio fingerprinting is a process that identifies a physical communication channel by the unique
fingerprint that characterizes its signal transmission. Each device needs to be characterized and, if nodes are
mobile and subject to varying multi-path and path-loss effects, the fingerprint might need to be revised many
time[4]. Thus method is prominently use in RFID devices like logistics, public transport.
VIII. PREVENTION TECHNIQUE OF ATTACKS
There are different methods are used for prevention of these attacks. In the distance fraud the location
will not be sufficient because the verifier does not trust the prover. He wants to prevent a fraud prover claiming
to be closer. Different type’s location mechanisms that prevent these attacks are:
A. Measure the signal strength
Node can calculate distance from other node by sending it a message and see how long it takes to
return. If response authenticated, fraud node can lie about being further away than it is, but not closer.
Sender includes strength of transmitted message in message; Receiver compares received strength to
transmitted strength to compute distance. Not secure, but can be useful when combined with other mechanisms.
B. Measure the round trip time
Another solutions measures the round trip time. The round trip time is the time required for exchange a
packet from a specific source to a specific destination and back again. In this protocol the verifier sends out a
challenge and starts a timer. After receiving the challenge, the prover does some very elementary computations
to construct the response. The response is sent back to the verifier and the timer is stopped. Multiplying this
time with the propagation speed of the signal gives the distance [6].
IX. PREVENTION OF ATTACKS
A. Prevention of Mafia fraud
Measuring the time of flight of an electromagnetic signal in the distance bounding protocol assures
that an attacker cannot be further away than (s) he pretends to be. Using this principle, not only we prevent
distance fraud attacks but also mafia fraud attacks. It is a relay-type attack where the adversary is modeled as a
fraudulent prover and verifier cooperating together. The fraudulent verifier interacts with the honest prover and
the fraudulent prover interacts with the honest verifier.
B. Prevention of Terrorist fraud
In the terrorist fraud, the adversary does not know the secret key of the prover. Now we will
demonstrate how the terrorist fraud attack can be applied to the distance bounding protocol of Brands and
Chaum. Roughly distance bounding protocol can be divided in three parts: the commitment phase, the fast bit
exchange phase and the signing phase (commitment). There is however no strong (cryptographic) relation
between these 3 phases.
There are two extended methods to prevent terrorist fraud attack in distance bounding protocol [1].
Real-Time Location Systems Security using Distance Bounding
www.ijres.org 48 | Page
Fast bit exchange using the secret key: This method uses three phases
1. Commitment phase where signals send.
2. In second phase challenge –response single bit interaction occurs.
3. And third phase, the prover uses zero knowledge prove to convince the verifier that he knows the secret
key.
Using trusted hardware: In this method we stabilize relationship in signing phase and bit exchange phase using
trusted hardware. In this phase attacker cannot get value from trusted hardware or cannot change the protocol
direct it has to perform [2].
X. ANALYSIS OF SECURE NEGHIBOUR DETECTION
A. Computation
In each phase calculations should be simple, otherwise they increase the round trip time. It should
consider that the computation-time for each round trip is non variant.
B. Storage
RFID distance-bounding protocol must require less storage.
C. Bandwidth
Time measurements are very fragile when the parties send other messages than bits [4]. The reason is
that on the one hand, fresh noise is introduced in the communication, and on the other hand, the unreliability of
the transmission increases with the size of the transmitted message.
D. Reliability
Industrial applications are required to be reliable [5]. In communication environments, communication
during the setup and verification stages can be transmitted via robust communication channels. However, it is
likely that bit errors will occur during the exchange stage. Without sufficient error-handling the protocol will
fail, and it will either require that the protocol executes again or cause the disruption of subsequent services.
XI. CONCLUSION
The security of industrial applications is important and physical location verification is one of the
serious concerns in RTLS applications. Distance bounding protocol will prevent attacks by computing the
distance between the prover and the verifier. We will measure round trip time to calculate the distance between
two nodes for secure authentication. The analysis demonstrates the security of the protocol against a variety of
attacks. Proposed system is reliable and applicable in real time system. In this paper, we have presented the
basic conceptual architecture of distance bounding protocol and prevention techniques of attacks.
REFERENCES
[1] R. Stoleru, H. Wu, H. Chenji, "Secure Neighbor Discovery in Mobile Ad Hoc Networks", Department of Computer Science and
Engineering, Texas A&M University in 2011 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
[2] Dave Singelee, Bart Preneel ESAT-COSIC, K.U. Leuven, Belgium. "Location Verification using Secure Distance Bounding
Protocols".
[3] Adnan Abu-Mahfouz, Member, IEEE, and Gerhard P. Hancke, Senior Member, IEEE "Distance Bounding: A Practical Security
Solution for Real-Time Location Systems".IEEE transactions on industrial informatics, vol. 9, no. 1, February 2013
[4] Chong Hee Kim and Gildas Avoine "RFID distance bounding protocol with mixed challenges to prevent relay attacks"
Universit´e Catholique de Louvain Louvain-la-Neuve, B-1348, Belgium
[5] Vom Fachbereich Informatik der Technischen Universitat Darmstadt genehmigte "Security Aspects of Distance-Bounding
Protocols" Tag der Einreichung: 20. June 2012 Tag der mundlichen Prufung: 04 July 2012
[6] Samer S. Saab, Senior Member, IEEE, and Zahi S. Nakad, Member, IEEE "A Standalone RFID Indoor Positioning System Using
Passive Tags". IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 58, NO. 5, MAY 2011

More Related Content

What's hot

Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
IJERA Editor
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
eSAT Journals
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
eSAT Publishing House
 
Dj4301653656
Dj4301653656Dj4301653656
Dj4301653656
IJERA Editor
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
aibad ahmed
 
Rm presentation on research paper
Rm presentation on research paperRm presentation on research paper
Rm presentation on research paper
Zeeshan Ahmed
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
IJNSA Journal
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
ijasuc
 

What's hot (20)

Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
Dj4301653656
Dj4301653656Dj4301653656
Dj4301653656
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
Rm presentation on research paper
Rm presentation on research paperRm presentation on research paper
Rm presentation on research paper
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
 
1705 1708
1705 17081705 1708
1705 1708
 

Viewers also liked

Child Activity Recognition Using Accelerometer and RFID Reader
Child Activity Recognition Using Accelerometer and RFID ReaderChild Activity Recognition Using Accelerometer and RFID Reader
Child Activity Recognition Using Accelerometer and RFID Reader
IJRES Journal
 
Investigations on Milling Tool: - A Literature Review
Investigations on Milling Tool: - A Literature ReviewInvestigations on Milling Tool: - A Literature Review
Investigations on Milling Tool: - A Literature Review
IJRES Journal
 
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
IJRES Journal
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
IJRES Journal
 
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
IJRES Journal
 
Solar Drying Technologies: A review
Solar Drying Technologies: A reviewSolar Drying Technologies: A review
Solar Drying Technologies: A review
IJRES Journal
 
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
IJRES Journal
 
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
IJRES Journal
 
Relation between Energy Saving and Economic Indices of Company
Relation between Energy Saving and Economic Indices of CompanyRelation between Energy Saving and Economic Indices of Company
Relation between Energy Saving and Economic Indices of Company
IJRES Journal
 
Bionic Nursing Bed
Bionic Nursing BedBionic Nursing Bed
Bionic Nursing Bed
IJRES Journal
 
A High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
A High Speed Transposed Form FIR Filter Using Floating Point Dadda MultiplierA High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
A High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
IJRES Journal
 
An Investigation into the Delays in Road Projects in Bahrain
An Investigation into the Delays in Road Projects in BahrainAn Investigation into the Delays in Road Projects in Bahrain
An Investigation into the Delays in Road Projects in Bahrain
IJRES Journal
 
Risk governance for traffic accidents by Geostatistical Analyst methods
Risk governance for traffic accidents by Geostatistical Analyst methodsRisk governance for traffic accidents by Geostatistical Analyst methods
Risk governance for traffic accidents by Geostatistical Analyst methods
IJRES Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
IJRES Journal
 
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
IJRES Journal
 
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear SpoilerCar’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
IJRES Journal
 
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
IJRES Journal
 

Viewers also liked (18)

Child Activity Recognition Using Accelerometer and RFID Reader
Child Activity Recognition Using Accelerometer and RFID ReaderChild Activity Recognition Using Accelerometer and RFID Reader
Child Activity Recognition Using Accelerometer and RFID Reader
 
Investigations on Milling Tool: - A Literature Review
Investigations on Milling Tool: - A Literature ReviewInvestigations on Milling Tool: - A Literature Review
Investigations on Milling Tool: - A Literature Review
 
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...
 
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...
 
Solar Drying Technologies: A review
Solar Drying Technologies: A reviewSolar Drying Technologies: A review
Solar Drying Technologies: A review
 
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...
 
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...
 
Relation between Energy Saving and Economic Indices of Company
Relation between Energy Saving and Economic Indices of CompanyRelation between Energy Saving and Economic Indices of Company
Relation between Energy Saving and Economic Indices of Company
 
Bionic Nursing Bed
Bionic Nursing BedBionic Nursing Bed
Bionic Nursing Bed
 
A High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
A High Speed Transposed Form FIR Filter Using Floating Point Dadda MultiplierA High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
A High Speed Transposed Form FIR Filter Using Floating Point Dadda Multiplier
 
An Investigation into the Delays in Road Projects in Bahrain
An Investigation into the Delays in Road Projects in BahrainAn Investigation into the Delays in Road Projects in Bahrain
An Investigation into the Delays in Road Projects in Bahrain
 
Risk governance for traffic accidents by Geostatistical Analyst methods
Risk governance for traffic accidents by Geostatistical Analyst methodsRisk governance for traffic accidents by Geostatistical Analyst methods
Risk governance for traffic accidents by Geostatistical Analyst methods
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...
 
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear SpoilerCar’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear Spoiler
 
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...
 

Similar to Real-Time Location Systems Security using Distance Bounding

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET Journal
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
HabitamuAsimare
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
ijtsrd
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
IOSR Journals
 
P017129296
P017129296P017129296
P017129296
IOSR Journals
 
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature AlgorithmSecure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
ijcnes
 
I1802046780
I1802046780I1802046780
I1802046780
IOSR Journals
 
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
IJNSA Journal
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A030101001006
A030101001006A030101001006
A030101001006
theijes
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
pharmaindexing
 
Detection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless networkDetection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless network
AM Publications
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired prjpublications
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
IAEME Publication
 

Similar to Real-Time Location Systems Security using Distance Bounding (20)

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature AlgorithmSecure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm
 
Jx2417041708
Jx2417041708Jx2417041708
Jx2417041708
 
I1802046780
I1802046780I1802046780
I1802046780
 
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A030101001006
A030101001006A030101001006
A030101001006
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
Detection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless networkDetection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless network
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
IJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
IJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
IJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
IJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
IJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
IJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
IJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
IJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
IJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
IJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Real-Time Location Systems Security using Distance Bounding

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.44-48 www.ijres.org 44 | Page Real-Time Location Systems Security using Distance Bounding Srikanth S P1 , Sunita Tiwari2 1 (Computer Science, MVJCE/VTU, Bangalore, India) 2 (Computer Science, MVJCE/VTU, Bangalore, India) ABSTRACT: Traditional Authentication protocols, that run between a prover and a verifier, enable the verifier to decide whether a prover is fraud or authenticate by using technique like password, smart card, but location based attacks cannot be prevent using these techniques. Networks like Real Time Location System (RTLS), Wireless, Mobile Adhoc Network (MANet) suffer location based attacks. Location based attacks categories in distance fraud, mafia fraud, and terrorist fraud. Distance bounding technique is use for secure neighbor detection in RTLS that cryptographically measure an upper bound for the physical distance between two network devices. In this paper propose architecture for physical proximity or location verification of devices, for all types of attacks and prevention technique to these location based attacks Keywords – Distance bounding protocol, secure neighbor detection, RTLS I. INTRODUCTION An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover. Distance-bounding is an authentication protocol prevent all three type of attacks, First is man -in -the- middle attack (MITM) or relay attacks, where an adversary forwards information between the prover and verifier such that neither honest party is aware of the attack[4]. Second, In distance attacks, a dishonest prover placed far from the verifier and Third terrorist attacks, where dishonest prover provides some limited help to the adversary, such that the adversary is able to authenticate to the honest verifier. However the prover should not forward any information that allows the adversary to authenticate without the prover's help. For secure Neighbor detection, a node in a network determines the secure neighbor detection and identifies other nodes in its entire trusted network area. It is used various protocols for secure neighbor detection including localization, directional antennas, RF fingerprinting, centralized system, location-based system. In Real Time Location System (RTLS), neighbors are usually defined as nodes that lie within radio range of each other [3]. In wireless communication, it is always assumed that devices are within the communication range and that communication range is location limited, which implicitly proves physical proximity. Distance bounding protocol properties is used with RFID tags. The most common RF tags is the ISO 14443 standard, which describes two types of tags which operate at a frequency of 13.56 MHz The ISO 14443 standard describes HF (high frequency) cards[4]. These cards operate at proximity, i.e., at around 10cm. Distance-bounding protocols are not applicable for high frequency tags, but only implementable in systems with low-latency channels. II. SCOPE OF PAPER The scope of the paper is to detecting attacks such as man-in-the- middle attack, terrorist attack and distance fraud. If an intruder comes in secure network and impose as a trusted entity, using the distance bounding protocol we can discover fraud entity. So that the data transmitted by the prover can be receive only by authenticated verifier not by the attacker who masquerades as the same identity of original node and to eliminate the attack. Communication involves two parties, a prover and a verifier, and provides the verifier with cryptographic proof as to the maximum physical distance to the prover. The verifier relies exclusively on information gained from executing the protocol with the prover. As the verifier requires a reliable and secure estimate of the distance to the prover, distance-bounding protocols should be integrated into the underlying communication channel. The security of the protocol therefore not only depends on the cryptographic mechanisms but also on the physical attributes of the communication channel that are used to measure proximity. III. EXISTING SYSTEM In conventional networks, authentication is often based upon password, secret key, and smart card or biometric. A prover convincing a verifier of some assertion is a frequently recurring element in many applications. The assertion is often the identity of the prover, but it can also be more general. Use GPS coordinates in a location verification scheme, but this method cannot be used indoor [1]. Location information does not always have to be so detailed; sometimes we are interested in the orientation. A lot of solutions can be
  • 2. Real-Time Location Systems Security using Distance Bounding www.ijres.org 45 | Page found in the location verification scheme. There are however some drawbacks to this method. For example, it cannot be used indoor. Location information does not always have to be so detailed in the distance, the environment. Combining these pieces of information will enable to determine the exact position of the other party. The scenario of existing system has been practically demonstrated against real-world RFID systems. The secure verification of a devices location relative to another device, so-called secure neighbor detection, is therefore crucial to the secure and reliable operation of industrial real-time location applications. IV. PROPOSED SYSTEM In the proposed system, attackers attacks the system and find the IP address of nodes, initial location to all the nodes and change the position of nodes by moves left and right. As our goal is not only to monitor real- time locations, but also to retrieve history location proof information when needed, a location proof server is necessary for storing the history records of the location proofs. Figure-1: Architecture of Proposed System It communicates directly with the prover nodes who submit their location proofs. As the source identities of the location proofs are stored as pseudonyms, the location proof server is entrusted in the sense that even though it is compromised and monitored by attackers, it is impossible for the attacker to reveal the real source of the location proof .The node who needs to collect location proofs from its neighboring nodes. When a location proof is needed at time, the prover will broadcast a location proof request to its neighboring nodes through network. If no positive response is received, the prover will generate a dummy location proof and submit it to the location proof server. A third-party user or an application who is authorized to verify a prover’s location within a specific time period. The verifier usually has close relationship with the prover, for example friends or colleagues, to be trusted enough to gain authorization. The propagation speed of sound is much slower than that of radio waves. As a result, an attacker can intercept the ultra sound communication and forward it over a faster radio or optical communication medium to an accomplice closer to the verifier or prover, thereby reducing the time measurement and decreasing the distance estimate. Radio Frequency (RF) channels are proposed as the channel for implementing distance bounding systems [3]. A challenge-response authentication protocol is used in tight time-out constraint. As a result, characteristics like attack resistance, resource requirements and execution time varies for each protocol. The setup and verification stages can be transmitted via robust communication channels. V. DISTANCE BOUNDING PROTOCOL A Distance-bounding protocol determines an upper bound for the physical distance between two communicating parties based on the Round-Trip-Time (RTT) of cryptographic challenge response pairs [1]. Verifying the physical location of a device using authentication protocol is an important security mechanism. Distance bounding protocol aim to prove the proximity of two devices relative to each other. Brands and Chaum proposed a distance bounding protocol that could be used to verify a device’s proximity cryptographically. This design based on a channel where the prover can reply instantaneously to each single binary digit received from the verifier. The number of challenge–response interactions is being determined by a chosen security parameter. Distance bounding protocol not only in the one-to-one proximity identification context but also as building blocks for secure location systems [3]. After correct execution of the distance bounding protocol, the verifier
  • 3. Real-Time Location Systems Security using Distance Bounding www.ijres.org 46 | Page knows that an entity having data is in the trusted network. Distance bounding protocol can be divided in three phase: the Commitment phase, the fast bit Exchange phase and signing phase. Figure-2: Distance Bounding Protocol (Brands and Chaum’s protocol s)[3] VI. ATTACKS IN DISTANCE BOUNDING Generally Three types of attacks that are discussed under Distance-Bounding: relay attack, terrorist attack and distance attack. A. Relay Attacks Relay or Mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man- in-the-middle (MITM) between the reader and an honest tag located outside the neighbor. Figure-3: Relay Fraud [2] B. Terrorist Attacks A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in- the-middle (MITM) between the reader and a dishonest tag located outside of the neighborhood, such that the latter actively helps the adversary to maximize her attack success probability, without giving to her any advantage for future attacks. Figure-4: Terrorist Fraud [3] C. Distance Attacks A distance fraud is an attack where a dishonest and lonely prover supports to be in the neighborhood of the verifier network. Figure-5: Distance Fraud [3] VerifierProver VerifierProver Fraud Prover Fraud Verifier VerifierProver Intruder
  • 4. Real-Time Location Systems Security using Distance Bounding www.ijres.org 47 | Page VII. GENERALIZE SECURE NEIGHBOUR DETECTION MODEL Following are the models for Secure Neighbor Detection A. Directional Antenna Directional antenna is an antenna which radiates in one or more directions allowing for increased performance on transmit and receive and reduced interference from unwanted sources. Directional antennas triangulate position using angle-of-arrival (AoA), which requires static reference nodes with antenna arrays providing fixed reference directions. These nodes must also have synchronized clocks to ensure that a transmission was made to multiple reference nodes at the same time [3]. B. Centralized Approaches In Centralized approach we assume that there are many entities that contribute data on centralized system, from where system can check for suspicious node presence by creating and analyzing system-wide entity model [2]. This model work effectively when numbers of entities are many in numbers, not for networks like that use point-to-point RFID link or device localization using RTLS with only three reference nodes. C. RF Fingerprinting Radio fingerprinting is a process that identifies a physical communication channel by the unique fingerprint that characterizes its signal transmission. Each device needs to be characterized and, if nodes are mobile and subject to varying multi-path and path-loss effects, the fingerprint might need to be revised many time[4]. Thus method is prominently use in RFID devices like logistics, public transport. VIII. PREVENTION TECHNIQUE OF ATTACKS There are different methods are used for prevention of these attacks. In the distance fraud the location will not be sufficient because the verifier does not trust the prover. He wants to prevent a fraud prover claiming to be closer. Different type’s location mechanisms that prevent these attacks are: A. Measure the signal strength Node can calculate distance from other node by sending it a message and see how long it takes to return. If response authenticated, fraud node can lie about being further away than it is, but not closer. Sender includes strength of transmitted message in message; Receiver compares received strength to transmitted strength to compute distance. Not secure, but can be useful when combined with other mechanisms. B. Measure the round trip time Another solutions measures the round trip time. The round trip time is the time required for exchange a packet from a specific source to a specific destination and back again. In this protocol the verifier sends out a challenge and starts a timer. After receiving the challenge, the prover does some very elementary computations to construct the response. The response is sent back to the verifier and the timer is stopped. Multiplying this time with the propagation speed of the signal gives the distance [6]. IX. PREVENTION OF ATTACKS A. Prevention of Mafia fraud Measuring the time of flight of an electromagnetic signal in the distance bounding protocol assures that an attacker cannot be further away than (s) he pretends to be. Using this principle, not only we prevent distance fraud attacks but also mafia fraud attacks. It is a relay-type attack where the adversary is modeled as a fraudulent prover and verifier cooperating together. The fraudulent verifier interacts with the honest prover and the fraudulent prover interacts with the honest verifier. B. Prevention of Terrorist fraud In the terrorist fraud, the adversary does not know the secret key of the prover. Now we will demonstrate how the terrorist fraud attack can be applied to the distance bounding protocol of Brands and Chaum. Roughly distance bounding protocol can be divided in three parts: the commitment phase, the fast bit exchange phase and the signing phase (commitment). There is however no strong (cryptographic) relation between these 3 phases. There are two extended methods to prevent terrorist fraud attack in distance bounding protocol [1].
  • 5. Real-Time Location Systems Security using Distance Bounding www.ijres.org 48 | Page Fast bit exchange using the secret key: This method uses three phases 1. Commitment phase where signals send. 2. In second phase challenge –response single bit interaction occurs. 3. And third phase, the prover uses zero knowledge prove to convince the verifier that he knows the secret key. Using trusted hardware: In this method we stabilize relationship in signing phase and bit exchange phase using trusted hardware. In this phase attacker cannot get value from trusted hardware or cannot change the protocol direct it has to perform [2]. X. ANALYSIS OF SECURE NEGHIBOUR DETECTION A. Computation In each phase calculations should be simple, otherwise they increase the round trip time. It should consider that the computation-time for each round trip is non variant. B. Storage RFID distance-bounding protocol must require less storage. C. Bandwidth Time measurements are very fragile when the parties send other messages than bits [4]. The reason is that on the one hand, fresh noise is introduced in the communication, and on the other hand, the unreliability of the transmission increases with the size of the transmitted message. D. Reliability Industrial applications are required to be reliable [5]. In communication environments, communication during the setup and verification stages can be transmitted via robust communication channels. However, it is likely that bit errors will occur during the exchange stage. Without sufficient error-handling the protocol will fail, and it will either require that the protocol executes again or cause the disruption of subsequent services. XI. CONCLUSION The security of industrial applications is important and physical location verification is one of the serious concerns in RTLS applications. Distance bounding protocol will prevent attacks by computing the distance between the prover and the verifier. We will measure round trip time to calculate the distance between two nodes for secure authentication. The analysis demonstrates the security of the protocol against a variety of attacks. Proposed system is reliable and applicable in real time system. In this paper, we have presented the basic conceptual architecture of distance bounding protocol and prevention techniques of attacks. REFERENCES [1] R. Stoleru, H. Wu, H. Chenji, "Secure Neighbor Discovery in Mobile Ad Hoc Networks", Department of Computer Science and Engineering, Texas A&M University in 2011 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems [2] Dave Singelee, Bart Preneel ESAT-COSIC, K.U. Leuven, Belgium. "Location Verification using Secure Distance Bounding Protocols". [3] Adnan Abu-Mahfouz, Member, IEEE, and Gerhard P. Hancke, Senior Member, IEEE "Distance Bounding: A Practical Security Solution for Real-Time Location Systems".IEEE transactions on industrial informatics, vol. 9, no. 1, February 2013 [4] Chong Hee Kim and Gildas Avoine "RFID distance bounding protocol with mixed challenges to prevent relay attacks" Universit´e Catholique de Louvain Louvain-la-Neuve, B-1348, Belgium [5] Vom Fachbereich Informatik der Technischen Universitat Darmstadt genehmigte "Security Aspects of Distance-Bounding Protocols" Tag der Einreichung: 20. June 2012 Tag der mundlichen Prufung: 04 July 2012 [6] Samer S. Saab, Senior Member, IEEE, and Zahi S. Nakad, Member, IEEE "A Standalone RFID Indoor Positioning System Using Passive Tags". IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 58, NO. 5, MAY 2011