A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [1] Privacy-Preserving Distance-Bounding Proof-of-Knowledge
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 74 - 88
  • [2] Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
    Bosk, Daniel
    Bouget, Simon
    Buchegger, Sonja
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 147 - 166
  • [3] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [4] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [5] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [7] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024,
  • [8] Privacy failure in the public-key distance-bounding protocols
    Vaudenay, Serge
    [J]. IET INFORMATION SECURITY, 2016, 10 (04) : 188 - 193
  • [9] Mafia Fraud Attack against the RC Distance-Bounding Protocol
    Mitrokotsa, Aikaterini
    Onete, Cristina
    Vaudenay, Serge
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [10] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821