A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [31] Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
    Kikuchi, Hiroaki
    Sato, Tomoki
    Sakuma, Jun
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 831 - 836
  • [32] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [33] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [34] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [35] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [36] A protocol for privacy-preserving closest pair of points
    Liu, Jie
    Yang, Bo
    Pang, Xiaoqiong
    Liu, J. (jessica.lyh66@gmail.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 6945 - 6953
  • [37] Strongly Privacy-Preserving Communication Protocol for VANETs
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Shih-Wei
    Juang, Wen-Shenq
    Huang, Jheng-Jia
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 119 - 126
  • [38] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [39] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214
  • [40] Locap: Privacy-Preserving Location Proximity Protocol
    Choi, Kyung
    Kim, Mihui
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 994 - 998