Total views : 232403

Authentication through Presence in Wireless Networks

Affiliations

  • Department of Computer Science, College of Computer Engineering, Safadasht Branch, Islamic Azad University, Tehran, Iran, Islamic Republic of

Abstract


Background/Objectives: In this study, we present Integrity Regions (IRegions), as a new security measure which can ensure proper authentication of messages exchange in a wireless network without using recertified or reestablished keys. This objective will be achieved by time-of-arrival ranging techniques to verify the location of target entity. Despite the vulnerability of ultrasonic ranging to distance modification attacks, it can be used to implement this method soundly and efficiently. Methods: Verification of presence is the solution implanted into Integrity regions (IRegions) to protect against MITM attacks mounted on wireless connections. Findings: This method can efficiently use range measurements to protect the system against attacks mounted by intercepting messages exchanged in the connection for each received message. This technique forces devices to verify each received message by checking that whether its source is located in an expected range (i.e., within the area called integrity region). Once the source of message is proved to be within the expected (safe) range, it will be accepted as authentic. This method therefore does not allow an MITM attack to be mounted from distance. In the case of suspicion of MITM attack, visually checking the area in the vicinity of device is enough to make sure that whether connection is safe or there is a chance that connection security is compromised. Application/Improvements: Both radio time of arrival and ultrasonic ranging methods can be used to realize IRegions; but using ultrasonic ranging because of its lower hardware requirements is the preferred course of action.

Keywords

Authentication, Integrity Regions, Network Security, Wireless network

Full Text:

 |  (PDF views: 266)

References


  • Boyd CA, Mathuria A. Protocols for key establishment and authentication. New York: Springer-Verlag Inc; 2003.
  • Rasmussen KB, Castelluccia C, Heydt-Benjamin TS, Capkun S. Proximity-based access control for implantable medical devices. Proceedings of 16th ACM Conference on Computer and Comm Security (CCS ’09); USA; 2009. p. 410–19.
  • Capkun S, Cagalj M. Integrity regions: Authentication through presence in wireless networks. Proceedings of ACM Workshop Wireless Security (WiSe ’06); USA; 2006.p. 1–10.
  • Kugler DK. Man in the middle attacks on bluetooth. Proceedings Financial Cryptography. 2003; 2742:149–61.
  • Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. Proceedings of ACM MobiHoc; USA; 2005.p. 46–57.
  • Cagalj M, Capkun S, Hubaux J-P. Key agreement in peertopeer wireless network. Proceedings IEEE, Special Issue on Security and Cryptography. 2006 Feb; 94(2):467–78.
  • Laur S, Asokan N, Nyberg K. Efficient mutual data authentication using manually authenticated strings: Preliminary version. Cryptology ePrint Archive. 2006; 4301:90-107.
  • Castelluccia C, Mutaf P. Shake them up! A movementbased pairing protocol for CPU-constrained devices. Proceedings ACM MobiSys; USA; 2005. p. 51–64.
  • Cagalj M, Hubaux J-P, Capkun S, Rengaswamy R, Tsigkogiannis I, Srivastava M. Integrity (I) codes: Message integrity protection and authentication over insecure channels. Proceedings of IEEE Symposium Security and Privacy (SP’06); 2006. p. 280–94.
  • McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: using camera phones for human-verifiable authentication. Proceedings of IEEE Symposium Security and Privacy (SP’05). 2005. p. 110–24.
  • Goodrich M, Sirivianos M, Solis J, Tsudik G, Uzun E. Loud and clear: Human-verifiable authentication based on audio. Proceedings 26th IEEE Int’l Conference on Distributed Computing Systems; 2006. p. 10.
  • Sastry N, Shankar U, Wagner D. Secure verification of location claims. Proceedings Second ACM Workshop Wireless Security (WiSe ’03); 2003. p. 1–10.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.