New Approaches for Secure Distance- Bounding

dc.contributor.advisorSafavi-Naini, Reihaneh S.
dc.contributor.authorAhmadi Fatlaki, Ahmad
dc.contributor.committeememberFong, Philip W. L.
dc.contributor.committeememberJacobson, Michael J.
dc.contributor.committeememberO'Keefe, Kyle P. G.
dc.contributor.committeememberValaee, Shahrokh
dc.date2018-11
dc.date.accessioned2018-05-25T21:13:33Z
dc.date.available2018-05-25T21:13:33Z
dc.date.issued2018-05-23
dc.description.abstractIn this thesis we design and implement three aspects of secure distance-bounding (DB) schemes as a type of authentication scheme that considers distance as an extra verification parameter. By adding this new parameter to authentication schemes, we can prevent certain attacks that are related to distance, such as relay attack. In fact, the attacking scenarios can be much more complex than the simple relay attack, in addition to the classic authentication scheme attacks. In this thesis we consider the most advanced distance-bounding attack scenarios in a variety of authentication models. We consider three authentication models in order to add the distance as an extra authentication factor: public-key and anonymous DB are the main fields of this thesis that consider strong adversary with access to directional antenna, and we consider One-Shot DB as a one-message authentication scheme. Each of these fields make a chapter of this thesis. Public-Key Distance-Bounding. In a public-key DB scheme, a prover who owns a key pair and is located within a distance bound to a verifier, who has access to the public-key of the prover, tries to convince the verifier that it is authentic and located within the distance bound. We provide a formal model and two protocols with security proofs. Anonymous Distance-Bounding. In an anonymous DB scheme, a prover who owns a registration certificate and is located within a distance bound to a verifier, who only has access to the public parameters of the system, tries to convince the verifier that it is authentic and located within the distance bound without revealing its identity. We provide a formal model and two secure protocols. One-Shot Distance-Bounding. In an one-shot DB scheme, a prover who owns a secret key and is located within a distance bound to a verifier, who has access to the corresponding key of the prover, tries to convince the verifier that it is authentic and located within the distance bound without receiving any message from the verifier. We provide a formal model and a secure protocol.en_US
dc.identifier.citationAhmadi Fatlaki, A. (2018). New Approaches for Secure Distance- Bounding (Doctoral thesis, University of Calgary, Calgary, Canada). Retrieved from https://prism.ucalgary.ca. doi:10.11575/PRISM/31947en_US
dc.identifier.doihttp://dx.doi.org/10.11575/PRISM/31947
dc.identifier.urihttp://hdl.handle.net/1880/106680
dc.language.isoeng
dc.publisher.facultyGraduate Studies
dc.publisher.facultyScience
dc.publisher.institutionUniversity of Calgaryen
dc.publisher.placeCalgaryen
dc.rightsUniversity of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission.
dc.subjectInformation Security
dc.subjectAuthentication
dc.subjectDistance-Bounding
dc.subjectPublic-Key Authentication
dc.subjectAnonymous Authentication
dc.subjectTimeliness
dc.subjectSynchronicity
dc.subjectIdentification
dc.subject.classificationComputer Scienceen_US
dc.titleNew Approaches for Secure Distance- Bounding
dc.typedoctoral thesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Calgary
thesis.degree.nameDoctor of Philosophy (PhD)
ucalgary.item.requestcopytrue
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ucalgary_2018_ahmadi-fatlaki_ahmad.pdf
Size:
1.35 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.74 KB
Format:
Item-specific license agreed upon to submission
Description: