1 / 9

Distance-bounding facing both mafia and distance frauds

Contactless technologies such as RFID, NFC, and sensor networks are vulnerable to mafia and distance frauds. These frauds aim at successfully passing an authentication protocol by cheating on the actual distance between the prover and the verifier. Distance-bounding protocols have been designed to cope these security issues. but none of them properly resists to these two frauds without requiring additional memory and computation. The situation is even worse considering that just a few distance-bounding protocols are able to deal with the inherent background noise on the communication channels. Contact Us 91 98406 78906, 91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple), X41, 5th Floor, 2nd avenue, Anna Nagar,Chennai-40

kaashivit
Download Presentation

Distance-bounding facing both mafia and distance frauds

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TAT LOGIC Authentication logic through turn around time for collution attacks in wireless sensor environment IEEE Transactions 2014 Paper“Distance-bounding facingboth mafia and distance frauds”

  2. A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager

  3. Abstract • Contactless technologies such as RFID, NFC, and sensor networks are vulnerable to mafia and distance frauds. These frauds aim at successfully passing an authentication protocol by cheating on the actual distance between the prover and the verifier. Distance-bounding protocols have been designed to cope these security issues. • but none of them properly resists to these two frauds without requiring additional memory and computation. The situation is even worse considering that just a few distance-bounding protocols are able to deal with the inherent background noise on the communication channels. • This article introduces a noise-resilient distance-bounding protocol that resists to both mafia and distance frauds. The security of the protocol is analyzed against known attacks and illustrated by experimental results. The results demonstrate the significant advantage of the introduced lightweight design over the previous proposals

  4. Existing System • Existing system focused on the problem of collusion in distance bounding, in which two dishonest verifiers pool information to make one of the verifiers look closer by sending similar kind of signals. • A verifier could then request to have a key distributed to it and the prover, which the prover could then use to authenticate its authenticated response. • Existing methodology involves the • Validating the users data origin in turn checking out the MAC data of the user requests raised. – arising from other machine indicates the genuinity of request origin.

  5. Proposed System • Proposed system holds the existing processing model with an enhanced ciphering algorithm to make the system more robust. • Although, the researchers are interested in authentication enhanced system. We are utilizing some of the concepts introduced in the secrecy logic for authenticating the users. This involves the logic to show what a verifier can conclude from interacting with an honest prover.A timing based input information followed by consecutive timing measurement provides more optimistic approach in authenticating the user. • Our proposed system provides a proof breaks down concept if the prover is dishonest. • Validate the authentication information provided by the user. • Extract the MAC address to validate the request origin location. • Consecutive Execution time duration on the request processing.

  6. System Requirements • Hardware Requirements: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB • Software Requirements: Platform : DOTNET (VS2010) , ASP.NET Dotnet framework 4.0 Database : SQL Server 2008 R2

  7. Architecture Diagram

  8. Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record

  9. Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.

More Related