A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol
نویسندگان
چکیده
Lightweight physical layer security schemes that have recently attracted a lot of attention include unclonable functions (PUFs), RF fingerprinting / proximity based authentication and secret key generation (SKG) from wireless fading coefficients. In this paper, we propose fast, privacy-preserving, zero-round-trip-time (0-RTT), multi-factor protocol, for the first time brings all these elements together, i.e., PUFs, estimation SKG. We use Kalman filters to extract estimates real measurements received signal strength (RSS) in an indoor environment provide soft fingerprints node authentication. By leveraging mobility, multitude such are extracted resistance impersonation type attacks e.g., false base station. Upon removal fingerprints, residual then used as entropy source distillation symmetric keys subsequently resumption secrets 0-RTT fast protocol. Both incorporated challenge-response PUF-based mutual shown be secure through formal proofs using Burrows, Abadi, Needham (BAN) Mao Boyd (MB) logic, well Tamarin-prover. Our protocol showcases future networks purely solutions tangible can alternative public infrastructure specific scenarios.
منابع مشابه
Zero Round-Trip Time for the Extended Access Control Protocol
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the...
متن کاملPredicting Round Trip Time for the TCP Protocol
The TCP protocol has been using the same algorithm to predict the next round trip time since the 1980’s. When most Internet traffic consisted of wired Ethernet routes, this made sense, however, with the advent of mobile, wireless Internet usage new methods are needed. This paper discusses the Fixed Share, Follow the Leader and Max Hedge Plus online machine learning algorithms as potential repla...
متن کاملRound Trip Time based Wormhole Attacks Detection
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...
متن کاملZero Knowledge Password Authentication Protocol
In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...
متن کاملAn Error-Control Scheme for a Multicast Protocol Based on Round-Trip Time Calculations
In contrast to traditional one-to-one applications, distributed multi-media applications are based on communication scenarios that involve huge, but often limited groups of participants. In general, tele-teaching and virtual reality scenarios require multicasting capabilities that have to deal with reliable data, e.g., simulation data, in addition to isochronous data, e.g., audio or video, that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3187967