Optimality results on the security of lookup-based protocols
conference contribution
posted on 2017-01-01, 00:00authored byS Mauw, J Toro-Pozo, R Trujillo-Rasua
Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol.
History
Pagination
137-150
Location
Hong Kong, China
Start date
2016-11-30
End date
2016-12-02
ISSN
0302-9743
eISSN
1611-3349
ISBN-13
9783319620237
Language
eng
Publication classification
E Conference publication, E1.1 Full written paper - refereed
Copyright notice
2017, Springer
Title of proceedings
Radio frequency identification and IoT security : 12th International Workshop, RFIDsec 2016, Hong Kong, China, November 30 - December 2, 2016, revised selected papers
Event
RFIDSec (Workshop) (12th : 2016 : Hong Kong, China)
Publisher
Springer
Place of publication
Berlin, Germany
Series
Lecture notes in computer science, 0302-9743 ; 10155