SlideShare a Scribd company logo
1 of 1
Download to read offline
DISTANCE BOUNDING: A PRACTICAL SECURITY SOLUTION FOR
REAL-TIME LOCATION SYSTEMS
ABSTRACT:
The need for implementing adequate security services in industrial applications is increasing.
Verifying the physical proximity or location of a device has become an important security
service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor
detection method that cryptographically determines an upper bound for the physical distance
between two communicating parties based on the round-trip time of cryptographic challenge-
response pairs.
This paper gives a brief overview of distance-bounding protocols and discusses the possibility of
implementing such protocols within industrial RFID and real-time location applications, which
requires an emphasis on aspects such as reliability and real-time communication. The practical
resource requirements and performance tradeoffs involved are illustrated using a sample of
distance-bounding proposals, and some remaining research challenges with regards to practical
implementation are discussed.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

What's hot

Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control systemPoonam Kherde
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptPhdtopiccom
 
Patentabilityof Software & Business Methods
Patentabilityof Software & Business MethodsPatentabilityof Software & Business Methods
Patentabilityof Software & Business MethodsBananaIP Counsels
 
Wireless Communication Projects Research Guidance
Wireless Communication Projects Research GuidanceWireless Communication Projects Research Guidance
Wireless Communication Projects Research GuidanceMatlab Simulation
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume Qiang Yu
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science StudentsPhdtopiccom
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
 
PhD Projects in Fog Computing
PhD Projects in Fog ComputingPhD Projects in Fog Computing
PhD Projects in Fog ComputingPhdtopiccom
 

What's hot (10)

Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control system
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
 
Patentabilityof Software & Business Methods
Patentabilityof Software & Business MethodsPatentabilityof Software & Business Methods
Patentabilityof Software & Business Methods
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Wireless Communication Projects Research Guidance
Wireless Communication Projects Research GuidanceWireless Communication Projects Research Guidance
Wireless Communication Projects Research Guidance
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
PhD Projects in Fog Computing
PhD Projects in Fog ComputingPhD Projects in Fog Computing
PhD Projects in Fog Computing
 
Qiang Yu
Qiang Yu  Qiang Yu
Qiang Yu
 

Viewers also liked

Introducción a la traducción
Introducción a la traducciónIntroducción a la traducción
Introducción a la traducciónmarcelaricci
 
Dotnet a survey of xml tree patterns
Dotnet  a survey of xml tree patternsDotnet  a survey of xml tree patterns
Dotnet a survey of xml tree patternsEcway Technologies
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...Ecway Technologies
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvementEcway Technologies
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecway Technologies
 
Dotnet an access point-based fec mechanism for video transmission over wirel...
Dotnet  an access point-based fec mechanism for video transmission over wirel...Dotnet  an access point-based fec mechanism for video transmission over wirel...
Dotnet an access point-based fec mechanism for video transmission over wirel...Ecway Technologies
 
Taal op koers! Social media in het mbo
Taal op koers! Social media in het mboTaal op koers! Social media in het mbo
Taal op koers! Social media in het mbosaMBO-ICT
 

Viewers also liked (10)

Introducción a la traducción
Introducción a la traducciónIntroducción a la traducción
Introducción a la traducción
 
Land art
Land artLand art
Land art
 
Dotnet a survey of xml tree patterns
Dotnet  a survey of xml tree patternsDotnet  a survey of xml tree patterns
Dotnet a survey of xml tree patterns
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Mapa conceptual danny reyes
Mapa conceptual danny reyesMapa conceptual danny reyes
Mapa conceptual danny reyes
 
Magazine Ideas
Magazine IdeasMagazine Ideas
Magazine Ideas
 
Dotnet an access point-based fec mechanism for video transmission over wirel...
Dotnet  an access point-based fec mechanism for video transmission over wirel...Dotnet  an access point-based fec mechanism for video transmission over wirel...
Dotnet an access point-based fec mechanism for video transmission over wirel...
 
Taal op koers! Social media in het mbo
Taal op koers! Social media in het mboTaal op koers! Social media in het mbo
Taal op koers! Social media in het mbo
 

Similar to Dotnet distance bounding a practical security solution for real-time location systems

A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...IRJET Journal
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioIRJET Journal
 
Networking IEEE 2014 Projects
Networking IEEE 2014 ProjectsNetworking IEEE 2014 Projects
Networking IEEE 2014 ProjectsVijay Karan
 
Networking ieee-2014-projects
Networking ieee-2014-projectsNetworking ieee-2014-projects
Networking ieee-2014-projectsVijay Karan
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0Journal Papers
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Wireless Technology in Industrial Automation
Wireless Technology in Industrial AutomationWireless Technology in Industrial Automation
Wireless Technology in Industrial AutomationArjay Automation
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 

Similar to Dotnet distance bounding a practical security solution for real-time location systems (20)

Distance bounding
Distance boundingDistance bounding
Distance bounding
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
 
Networking IEEE 2014 Projects
Networking IEEE 2014 ProjectsNetworking IEEE 2014 Projects
Networking IEEE 2014 Projects
 
Networking ieee-2014-projects
Networking ieee-2014-projectsNetworking ieee-2014-projects
Networking ieee-2014-projects
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Wireless Technology in Industrial Automation
Wireless Technology in Industrial AutomationWireless Technology in Industrial Automation
Wireless Technology in Industrial Automation
 
REVIEW ON RESCUE AND PROTECTION SYSTEM FOR UNDERGROUND MINE WORKERS AND FACTO...
REVIEW ON RESCUE AND PROTECTION SYSTEM FOR UNDERGROUND MINE WORKERS AND FACTO...REVIEW ON RESCUE AND PROTECTION SYSTEM FOR UNDERGROUND MINE WORKERS AND FACTO...
REVIEW ON RESCUE AND PROTECTION SYSTEM FOR UNDERGROUND MINE WORKERS AND FACTO...
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 

Dotnet distance bounding a practical security solution for real-time location systems

  • 1. DISTANCE BOUNDING: A PRACTICAL SECURITY SOLUTION FOR REAL-TIME LOCATION SYSTEMS ABSTRACT: The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge- response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com