2nd International ICST Conference on Security and Privacy in Comunication Networks

Research Article

Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359532,
        author={Catherine  Meadows and Paul Syverson and LiWu Chang},
        title={Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks},
        proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2007},
        month={5},
        keywords={},
        doi={10.1109/SECCOMW.2006.359532}
    }
    
  • Catherine Meadows
    Paul Syverson
    LiWu Chang
    Year: 2007
    Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOMW.2006.359532
Catherine Meadows1,*, Paul Syverson1,*, LiWu Chang1,*
  • 1: Naval Research Laboratory, Washington.
*Contact email: meadows@itd.nrl.navy.mil, syverson@itd.nrl.navy.mil, lchang@itd.nrl.navy.mil

Abstract

In this paper we describe two secure protocols for estimating distance in sensor networks based on time of flight of signals. Both have lower message complexity and lower overhead than similar protocols offering the same degree of security. One is a distance bounding protocol, in which a dishonest node that is not in collusion with any other dishonest nodes can pretend to be further away than it is, but not any closer. Another is an authenticated distance estimation protocol in which an honest node can compute its distance from another honest node without fear of their communication being hijacked by an attacker. We provide a formal analysis to show that these protocols satisfy their security properties