A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [41] Privacy-preserving registration protocol for mobile network
    Liu, He
    Liang, Mangui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1653 - 1671
  • [42] Protocol for Privacy-Preserving Set Pattern Matching
    Zheng Qiang
    Luo Shou-shan
    Xin Yang
    Yang Yi-xian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 168 - 172
  • [43] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [44] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [45] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [46] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [47] On Selecting the Nonce Length in Distance-Bounding Protocols
    Mitrokotsa, Aikaterini
    Peris-Lopez, Pedro
    Dimitrakakis, Christos
    Vaudenay, Serge
    COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
  • [48] A novel multi-hop distance-bounding protocol used in wireless sensor networks
    Luo, Han-guang
    Su, Jian
    Wen, Guang-jun
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [49] Bounding the Invertibility of Privacy-Preserving Instance Encoding Using Fisher Information
    Maeng, Kiwan
    Guo, Chuan
    Kariyappa, Sanjay
    Suh, G. Edward
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [50] A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
    Avoine, Gildas
    Bultel, Xavier
    Gambs, Sebastien
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    Robert, Jean-Marc
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 800 - 814