Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

被引:12
|
作者
Pietrzak, Krzysztof [1 ]
机构
[1] IST Austria, Klosterneuburg, Austria
来源
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-030-65277-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently several projects aim at designing and implementing protocols for privacy preserving automated contact tracing to help fight the current pandemic. Those proposal are quite similar, and in their most basic form basically propose an app for mobile phones which broadcasts frequently changing pseudorandom identifiers via (low energy) Bluetooth, and at the same time, the app stores IDs broadcast by phones in its proximity. Only if a user is tested positive, they upload either the beacons they did broadcast (which is the case in decentralized proposals as DP-3T, east and west coast PACT or Covid watch) or received (as in Popp-PT or ROBERT) during the last two weeks or so. Vaudenay [eprint 2020/399] observes that this basic scheme (he considers the DP-3T proposal) succumbs to relay and even replay attacks, and proposes more complex interactive schemes which prevent those attacks without giving up too many privacy aspects. Unfortunately interaction is problematic for this application for efficiency and security reasons. The countermeasures that have been suggested so far are either not practical or give up on key privacy aspects. We propose a simple non-interactive variant of the basic protocol that - (security) Provably prevents replay and (if location data is available) relay attacks. - (privacy) The data of all parties (even jointly) reveals no information on the location or time where encounters happened. - (efficiency) The broadcasted message can fit into 128 bits and uses only basic crypto (commitments and secret key authentication). Towards this end we introduce the concept of "delayed authentication", which basically is a message authentication code where verification can be done in two steps, where the first doesn't require the key, and the second doesn't require the message.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [21] Preventing Private Information Inference Attacks on Social Networks
    Heatherly, Raymond
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (08) : 1849 - 1862
  • [22] Preventing impersonation attacks in MANET with multi-factor authentication
    Glynos, D
    Kotzanikolaou, P
    Douligeris, C
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 59 - 64
  • [23] Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance
    Stokes, Jack W.
    England, Paul
    Kane, Kevin
    [J]. 2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [24] SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes
    Millican, Jonathan
    Stajano, Frank
    [J]. TECHNOLOGY AND PRACTICE OF PASSWORDS, PASSWORDS'14, 2015, 9393 : 146 - 152
  • [25] Physical Layer Protection Against Relay/Replay Attacks for Short-Range Systems
    Paschou, Chrysanthi
    Johnson, Oliver
    Zhu, Ziming
    Doufexi, Angela
    [J]. 2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [26] Secure Networked Control Systems Against Replay Attacks Without Injecting Authentication Noise
    Tang, Bixiang
    Alvergue, Luis D.
    Gu, Guoxiang
    [J]. 2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 6028 - 6033
  • [27] An Authentication Mechanism for Remote Keyless Entry Systems in Cars to Prevent Replay and RollJam Attacks
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    [J]. 2022 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2022, : 1725 - 1730
  • [28] Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing
    Czybik, Stefan
    Arp, Daniel
    Rieck, Konrad
    [J]. CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 264 - 275
  • [29] Investigating Traffic Analysis Attacks on Apple iCloud Private Relay
    Zohaib, Ali
    Sheffey, Jade
    Houmansadr, Amir
    [J]. PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 773 - 784
  • [30] Shared Authentication Information for preventing DDoS attacks in mobile WiMAX networks
    Kim, Youngwook
    Lim, Hyoung-Kyu
    Bahk, Saewoong
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 765 - +