SlideShare a Scribd company logo
DISTANCE BOUNDING: A PRACTICAL SECURITY SOLUTION FOR
REAL-TIME LOCATION SYSTEMS
ABSTRACT:
The need for implementing adequate security services in industrial applications is increasing.
Verifying the physical proximity or location of a device has become an important security
service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor
detection method that cryptographically determines an upper bound for the physical distance
between two communicating parties based on the round-trip time of cryptographic challenge-
response pairs.
This paper gives a brief overview of distance-bounding protocols and discusses the possibility of
implementing such protocols within industrial RFID and real-time location applications, which
requires an emphasis on aspects such as reliability and real-time communication. The practical
resource requirements and performance tradeoffs involved are illustrated using a sample of
distance-bounding proposals, and some remaining research challenges with regards to practical
implementation are discussed.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com
Ad

More Related Content

What's hot (10)

Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control system
Poonam Kherde
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
Phdtopiccom
 
Patentabilityof Software & Business Methods
Patentabilityof Software & Business MethodsPatentabilityof Software & Business Methods
Patentabilityof Software & Business Methods
BananaIP Counsels
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
Hitesh Mohapatra
 
Wireless Communication Projects Research Guidance
Wireless Communication Projects Research GuidanceWireless Communication Projects Research Guidance
Wireless Communication Projects Research Guidance
Matlab Simulation
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
Qiang Yu
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
Phdtopiccom
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
Iván Alfonso
 
PhD Projects in Fog Computing
PhD Projects in Fog ComputingPhD Projects in Fog Computing
PhD Projects in Fog Computing
Phdtopiccom
 
Qiang Yu
Qiang Yu  Qiang Yu
Qiang Yu
Qiang Yu
 
Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control system
Poonam Kherde
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
Phdtopiccom
 
Patentabilityof Software & Business Methods
Patentabilityof Software & Business MethodsPatentabilityof Software & Business Methods
Patentabilityof Software & Business Methods
BananaIP Counsels
 
Wireless Communication Projects Research Guidance
Wireless Communication Projects Research GuidanceWireless Communication Projects Research Guidance
Wireless Communication Projects Research Guidance
Matlab Simulation
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
Qiang Yu
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
Phdtopiccom
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
Iván Alfonso
 
PhD Projects in Fog Computing
PhD Projects in Fog ComputingPhD Projects in Fog Computing
PhD Projects in Fog Computing
Phdtopiccom
 

Similar to Java distance bounding a practical security solution for real-time location systems (20)

Distance bounding
Distance boundingDistance bounding
Distance bounding
Harish Kumar
 
Real-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance BoundingReal-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance Bounding
IJRES Journal
 
RFID security presentation
RFID security presentationRFID security presentation
RFID security presentation
mdxtech
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Ecwayt
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecwaytechnoz
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecway2004
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecwayt
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
ecwayprojects
 
Wba2 Project Description En Tech
Wba2  Project Description En TechWba2  Project Description En Tech
Wba2 Project Description En Tech
imec.archive
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprinting
Hanumesh Palla
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Secure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.docSecure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.doc
RanganathSri1
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Ecway Technologies
 
Java discovery and verification of neighbor positions in mobile ad hoc networks
Java  discovery and verification of neighbor positions in mobile ad hoc networksJava  discovery and verification of neighbor positions in mobile ad hoc networks
Java discovery and verification of neighbor positions in mobile ad hoc networks
ecwayerode
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
 
Location proof
Location proof Location proof
Location proof
Kamal Spring
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACHMINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
ijceronline
 
Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
Ecway2004
 
Real-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance BoundingReal-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance Bounding
IJRES Journal
 
RFID security presentation
RFID security presentationRFID security presentation
RFID security presentation
mdxtech
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Ecwayt
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecwaytechnoz
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecway2004
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Ecwayt
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
ecwayprojects
 
Wba2 Project Description En Tech
Wba2  Project Description En TechWba2  Project Description En Tech
Wba2 Project Description En Tech
imec.archive
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprinting
Hanumesh Palla
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Secure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.docSecure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.doc
RanganathSri1
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Ecway Technologies
 
Java discovery and verification of neighbor positions in mobile ad hoc networks
Java  discovery and verification of neighbor positions in mobile ad hoc networksJava  discovery and verification of neighbor positions in mobile ad hoc networks
Java discovery and verification of neighbor positions in mobile ad hoc networks
ecwayerode
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACHMINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
ijceronline
 
Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
Ecway2004
 
Ad

Java distance bounding a practical security solution for real-time location systems

  • 1. DISTANCE BOUNDING: A PRACTICAL SECURITY SOLUTION FOR REAL-TIME LOCATION SYSTEMS ABSTRACT: The need for implementing adequate security services in industrial applications is increasing. Verifying the physical proximity or location of a device has become an important security service in ad-hoc wireless environments. Distance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge- response pairs. This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com
  翻译: