A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [1] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [2] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [3] The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al.
    Vladimir Belsky
    Anastasiia Chichaeva
    Vasily Shishkin
    Kirill Tsaregorodtsev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) : 485 - 495
  • [4] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 485 - 495
  • [5] Directional Distance-Bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 197 - 221
  • [6] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [7] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257
  • [8] Cryptanalysis of a Privacy-Preserving Aggregation Protocol
    Datta, Amit
    Joye, Marc
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 693 - 694
  • [9] Privacy-Preserving Inverse Distance Weighted Interpolation
    Bulent Tugrul
    Huseyin Polat
    Arabian Journal for Science and Engineering, 2014, 39 : 2773 - 2781
  • [10] Privacy-Preserving Inverse Distance Weighted Interpolation
    Tugrul, Bulent
    Polat, Huseyin
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (04) : 2773 - 2781