Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem

In Time Hopping Ultra-WideBand Impulse Radio (TH-UWB-IR) communication systems, relay attacks represent nowadays a critical threat to authentication protocols. This risk can be mitigated through the use of Distance Bounding (DB) protocols. Some recent works have discussed many issues on the implementation of distance bounding protocols (DB) on UWB communication was considered in the context of single Prover and a single Verifier. In our work, we adapt the THSKI protocol to privacy Group Distance Bounding protocol with NTRU cryptography system. The security and the different merits of the proposed protocol are analyzed.

[1]  Srdjan Capkun,et al.  Security of Distance Bounding Protocols , 2011, Encyclopedia of Cryptography and Security.

[2]  J. K. Townsend,et al.  A novel impulse radio network for tactical military wireless communications , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[3]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[4]  Gildas Avoine,et al.  Comparing distance bounding protocols: A critical mission supported by decision theory , 2015, Comput. Commun..

[5]  Kyle Wilhelm,et al.  Aspects of hardware methodologies for the NTRU public-key cryptosystem , 2008 .

[6]  Samy Bengio,et al.  Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.

[7]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[8]  Cédric Lauradoux,et al.  Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[9]  Jens-Peter E Kaps,et al.  Cryptography for Ultra-Low Power Devices , 2006 .

[10]  Srdjan Capkun,et al.  Realization of RF Distance Bounding , 2010, USENIX Security Symposium.

[11]  Karim M. El Defrawy,et al.  Security and privacy in location-based mobile ad-hoc networks , 2010 .

[12]  Laurent Bussard,et al.  Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks , 2005, SEC.

[13]  Gildas Avoine,et al.  RFID Distance Bounding Protocols with Mixed Challenges , 2011, IEEE Transactions on Wireless Communications.

[14]  Serge Vaudenay,et al.  Secure and Lightweight Distance-Bounding , 2013, LightSec.

[15]  Gildas Avoine,et al.  The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.