Towards Quantum Distance Bounding Protocols View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2017-07-20

AUTHORS

Aysajan Abidin , Eduard Marin , Dave Singelée , Bart Preneel

ABSTRACT

Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the prover to process the challenges and compute and transmit the responses as low as possible. For this purpose, different implementation approaches have been proposed in the literature, both in the analog as in the digital domain. Moreover, different types of communication channels have been proposed as well to find an optimal balance between security and implementation feasibility. This paper is the first to evaluate the feasibility of implementing DB protocols using quantum communication. Unlike conventional DB protocols, which execute the rapid-bit exchanges over a Radio Frequency (RF) or ultrasound channel, our quantum-based DB protocol makes use of quantum-bit (qubit) transmissions and detection during the challenge-response phase. Our protocol offers security against distance fraud, mafia fraud and terrorist attacks. We also discuss how to protect against some specific implementation attacks, such as double read-out and quantum attacks, and give an overview of the main implementation challenges as well as possible limitations. More... »

PAGES

151-162

Book

TITLE

Radio Frequency Identification and IoT Security

ISBN

978-3-319-62023-7
978-3-319-62024-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-62024-4_11

DOI

http://dx.doi.org/10.1007/978-3-319-62024-4_11

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1090803694


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "imec-COSIC KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Abidin", 
        "givenName": "Aysajan", 
        "id": "sg:person.012154455115.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012154455115.82"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "imec-COSIC KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Marin", 
        "givenName": "Eduard", 
        "id": "sg:person.07666215657.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07666215657.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "imec-COSIC KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Singel\u00e9e", 
        "givenName": "Dave", 
        "id": "sg:person.016361516355.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016361516355.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "imec-COSIC KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-07-20", 
    "datePublishedReg": "2017-07-20", 
    "description": "Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the prover to process the challenges and compute and transmit the responses as low as possible. For this purpose, different implementation approaches have been proposed in the literature, both in the analog as in the digital domain. Moreover, different types of communication channels have been proposed as well to find an optimal balance between security and implementation feasibility. This paper is the first to evaluate the feasibility of implementing DB protocols using quantum communication. Unlike conventional DB protocols, which execute the rapid-bit exchanges over a Radio Frequency (RF) or ultrasound channel, our quantum-based DB protocol makes use of quantum-bit (qubit) transmissions and detection during the challenge-response phase. Our protocol offers security against distance fraud, mafia fraud and terrorist attacks. We also discuss how to protect against some specific implementation attacks, such as double read-out and quantum attacks, and give an overview of the main implementation challenges as well as possible limitations.", 
    "editor": [
      {
        "familyName": "Hancke", 
        "givenName": "Gerhard P.", 
        "type": "Person"
      }, 
      {
        "familyName": "Markantonakis", 
        "givenName": "Konstantinos", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-62024-4_11", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-62023-7", 
        "978-3-319-62024-4"
      ], 
      "name": "Radio Frequency Identification and IoT Security", 
      "type": "Book"
    }, 
    "keywords": [
      "DB protocols", 
      "distance bounding", 
      "challenge-response scheme", 
      "communication channels", 
      "Distance Bounding Protocol", 
      "different implementation approaches", 
      "security techniques", 
      "distance fraud", 
      "mafia fraud", 
      "quantum attacks", 
      "implementation attacks", 
      "implementation approach", 
      "ultrasound channels", 
      "digital domain", 
      "implementation feasibility", 
      "key challenges", 
      "security", 
      "attacks", 
      "main implementation challenges", 
      "implementation challenges", 
      "fraud", 
      "protocol", 
      "radio frequency", 
      "provers", 
      "compute", 
      "challenges", 
      "physical distance", 
      "optimal balance", 
      "communication", 
      "scheme", 
      "terrorist attacks", 
      "feasibility", 
      "quantum communication", 
      "bounding", 
      "different types", 
      "channels", 
      "detection", 
      "domain", 
      "transmission", 
      "technique", 
      "parties", 
      "limitations", 
      "overview", 
      "possible limitations", 
      "physical properties", 
      "exchange", 
      "distance", 
      "time", 
      "use", 
      "purpose", 
      "literature", 
      "types", 
      "properties", 
      "balance", 
      "phase", 
      "paper", 
      "frequency", 
      "approach", 
      "analogues", 
      "response"
    ], 
    "name": "Towards Quantum Distance Bounding Protocols", 
    "pagination": "151-162", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1090803694"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-62024-4_11"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-62024-4_11", 
      "https://app.dimensions.ai/details/publication/pub.1090803694"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:53", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_150.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-62024-4_11"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-62024-4_11'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-62024-4_11'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-62024-4_11'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-62024-4_11'


 

This table displays all metadata directly associated to this object as RDF triples.

145 TRIPLES      22 PREDICATES      84 URIs      77 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-62024-4_11 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N7275c42bb5f640cbb73136661ad8066d
4 schema:datePublished 2017-07-20
5 schema:datePublishedReg 2017-07-20
6 schema:description Distance Bounding (DB) is a security technique through which it is possible to determine an upper-bound on the physical distance between two parties (denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the prover to process the challenges and compute and transmit the responses as low as possible. For this purpose, different implementation approaches have been proposed in the literature, both in the analog as in the digital domain. Moreover, different types of communication channels have been proposed as well to find an optimal balance between security and implementation feasibility. This paper is the first to evaluate the feasibility of implementing DB protocols using quantum communication. Unlike conventional DB protocols, which execute the rapid-bit exchanges over a Radio Frequency (RF) or ultrasound channel, our quantum-based DB protocol makes use of quantum-bit (qubit) transmissions and detection during the challenge-response phase. Our protocol offers security against distance fraud, mafia fraud and terrorist attacks. We also discuss how to protect against some specific implementation attacks, such as double read-out and quantum attacks, and give an overview of the main implementation challenges as well as possible limitations.
7 schema:editor N2ddf74dbc7f84058b9da658f4e6d7828
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nd4af6e00c93747f3bfdbec99bb5cd7de
11 schema:keywords DB protocols
12 Distance Bounding Protocol
13 analogues
14 approach
15 attacks
16 balance
17 bounding
18 challenge-response scheme
19 challenges
20 channels
21 communication
22 communication channels
23 compute
24 detection
25 different implementation approaches
26 different types
27 digital domain
28 distance
29 distance bounding
30 distance fraud
31 domain
32 exchange
33 feasibility
34 fraud
35 frequency
36 implementation approach
37 implementation attacks
38 implementation challenges
39 implementation feasibility
40 key challenges
41 limitations
42 literature
43 mafia fraud
44 main implementation challenges
45 optimal balance
46 overview
47 paper
48 parties
49 phase
50 physical distance
51 physical properties
52 possible limitations
53 properties
54 protocol
55 provers
56 purpose
57 quantum attacks
58 quantum communication
59 radio frequency
60 response
61 scheme
62 security
63 security techniques
64 technique
65 terrorist attacks
66 time
67 transmission
68 types
69 ultrasound channels
70 use
71 schema:name Towards Quantum Distance Bounding Protocols
72 schema:pagination 151-162
73 schema:productId N6a63ed8d78814eb7af9bec9e7a46bb77
74 Na9e424293b93498f85b05de4045d1fb0
75 schema:publisher Na2b64941777645b28f950a061025cc62
76 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090803694
77 https://doi.org/10.1007/978-3-319-62024-4_11
78 schema:sdDatePublished 2022-10-01T06:53
79 schema:sdLicense https://scigraph.springernature.com/explorer/license/
80 schema:sdPublisher Na7124cdd76a549339d3882890ea03fbb
81 schema:url https://doi.org/10.1007/978-3-319-62024-4_11
82 sgo:license sg:explorer/license/
83 sgo:sdDataset chapters
84 rdf:type schema:Chapter
85 N0c3ad1086168437d88b0562ccdbb6df6 rdf:first sg:person.07666215657.35
86 rdf:rest Na48bd5ff88264cb38495357ef14cd983
87 N0d44a1737326494a93ea9318d60a1256 schema:familyName Hancke
88 schema:givenName Gerhard P.
89 rdf:type schema:Person
90 N2ddf74dbc7f84058b9da658f4e6d7828 rdf:first N0d44a1737326494a93ea9318d60a1256
91 rdf:rest Nf088b2a3eddb440fa2cbf76c4cd9c752
92 N3374237b3f1e4442912ee8401ea89c58 schema:familyName Markantonakis
93 schema:givenName Konstantinos
94 rdf:type schema:Person
95 N4754b717b72249be841270a8ce48014a rdf:first sg:person.011115044357.39
96 rdf:rest rdf:nil
97 N6a63ed8d78814eb7af9bec9e7a46bb77 schema:name dimensions_id
98 schema:value pub.1090803694
99 rdf:type schema:PropertyValue
100 N7275c42bb5f640cbb73136661ad8066d rdf:first sg:person.012154455115.82
101 rdf:rest N0c3ad1086168437d88b0562ccdbb6df6
102 Na2b64941777645b28f950a061025cc62 schema:name Springer Nature
103 rdf:type schema:Organisation
104 Na48bd5ff88264cb38495357ef14cd983 rdf:first sg:person.016361516355.26
105 rdf:rest N4754b717b72249be841270a8ce48014a
106 Na7124cdd76a549339d3882890ea03fbb schema:name Springer Nature - SN SciGraph project
107 rdf:type schema:Organization
108 Na9e424293b93498f85b05de4045d1fb0 schema:name doi
109 schema:value 10.1007/978-3-319-62024-4_11
110 rdf:type schema:PropertyValue
111 Nd4af6e00c93747f3bfdbec99bb5cd7de schema:isbn 978-3-319-62023-7
112 978-3-319-62024-4
113 schema:name Radio Frequency Identification and IoT Security
114 rdf:type schema:Book
115 Nf088b2a3eddb440fa2cbf76c4cd9c752 rdf:first N3374237b3f1e4442912ee8401ea89c58
116 rdf:rest rdf:nil
117 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
118 schema:name Information and Computing Sciences
119 rdf:type schema:DefinedTerm
120 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
121 schema:name Data Format
122 rdf:type schema:DefinedTerm
123 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
124 schema:familyName Preneel
125 schema:givenName Bart
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
127 rdf:type schema:Person
128 sg:person.012154455115.82 schema:affiliation grid-institutes:grid.5596.f
129 schema:familyName Abidin
130 schema:givenName Aysajan
131 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012154455115.82
132 rdf:type schema:Person
133 sg:person.016361516355.26 schema:affiliation grid-institutes:grid.5596.f
134 schema:familyName Singelée
135 schema:givenName Dave
136 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016361516355.26
137 rdf:type schema:Person
138 sg:person.07666215657.35 schema:affiliation grid-institutes:grid.5596.f
139 schema:familyName Marin
140 schema:givenName Eduard
141 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07666215657.35
142 rdf:type schema:Person
143 grid-institutes:grid.5596.f schema:alternateName imec-COSIC KU Leuven, Leuven, Belgium
144 schema:name imec-COSIC KU Leuven, Leuven, Belgium
145 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...