{"title":"在传感器网络中使用更有效的距离边界协议","authors":"C. Meadows, P. Syverson, LiWu Chang","doi":"10.1109/SECCOMW.2006.359532","DOIUrl":null,"url":null,"abstract":"In this paper we describe two secure protocols for estimating distance in sensor networks based on time of flight of signals. Both have lower message complexity and lower overhead than similar protocols offering the same degree of security. One is a distance bounding protocol, in which a dishonest node that is not in collusion with any other dishonest nodes can pretend to be further away than it is, but not any closer. Another is an authenticated distance estimation protocol in which an honest node can compute its distance from another honest node without fear of their communication being hijacked by an attacker. We provide a formal analysis to show that these protocols satisfy their security properties","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks\",\"authors\":\"C. Meadows, P. Syverson, LiWu Chang\",\"doi\":\"10.1109/SECCOMW.2006.359532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we describe two secure protocols for estimating distance in sensor networks based on time of flight of signals. Both have lower message complexity and lower overhead than similar protocols offering the same degree of security. One is a distance bounding protocol, in which a dishonest node that is not in collusion with any other dishonest nodes can pretend to be further away than it is, but not any closer. Another is an authenticated distance estimation protocol in which an honest node can compute its distance from another honest node without fear of their communication being hijacked by an attacker. We provide a formal analysis to show that these protocols satisfy their security properties\",\"PeriodicalId\":156828,\"journal\":{\"name\":\"2006 Securecomm and Workshops\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Securecomm and Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECCOMW.2006.359532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks
In this paper we describe two secure protocols for estimating distance in sensor networks based on time of flight of signals. Both have lower message complexity and lower overhead than similar protocols offering the same degree of security. One is a distance bounding protocol, in which a dishonest node that is not in collusion with any other dishonest nodes can pretend to be further away than it is, but not any closer. Another is an authenticated distance estimation protocol in which an honest node can compute its distance from another honest node without fear of their communication being hijacked by an attacker. We provide a formal analysis to show that these protocols satisfy their security properties