HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
Authors: E. Pagnin, E. Yang, G. Hancke, A. Mitrokotsa
In: 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2015
Full Text:
Abstract
Authentication for resource-constrained devices is seen as
one of the major challenges in current wireless communication networks.
The HB+ protocol performs device authentication based on the learning parity with noise (LPN) problem
and simple computational steps, that renders it suitable for resource-constrained devices such as
radio frequency identification (RFID) tags.
However, it has been shown that the HB+ protocol as well as many of its variants are vulnerable
to a simple man-in-the-middle attack.
We demonstrate that this attack could be mitigated using physical layer measures
from distance-bounding and simple modifications to devices’ radio receivers.
Our hybrid solution (HB+DB) is shown to
provide both effective distance-bounding using a lightweight
HB+ -based response function, and resistance against the
man-in-the-middle attack to HB+. We provide experimental evaluation of our results as well as a brief discussion on
practical requirements for secure implementation.
Keywords: Distance bounding, HB-protocol, HB+, physical layer security.