A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [21] Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing
    Xiao, Mingjun
    Gao, Guoju
    Wu, Jie
    Zhang, Sheng
    Huang, Liusheng
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (02) : 519 - 532
  • [22] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [23] Experimental analysis of a privacy-preserving scalar product protocol
    Yang, ZQ
    Wright, RN
    Subramaniam, H
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 47 - 52
  • [24] Privacy-Preserving Profile Matching Protocol Considering Conditions
    Ishikuro, Yosuke
    Omote, Kazumasa
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 171 - 183
  • [25] Lightweight and Privacy-Preserving Authentication Protocol for Smart Village
    Panigrahi, Ranjeet Kumar
    Kumar, Raghvendra
    INTERNET TECHNOLOGY LETTERS, 2024,
  • [26] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [27] A Distance-Bounding Concept for Bilateral IEEE 802.15.4 Communication
    Wittwer, Joachim
    Kirsch, Fabian
    Vossiek, Martin
    IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS AND ELECTRONICS SYSTEMS (COMCAS 2009), 2009,
  • [28] Distance-Bounding Protocols: Verification without Time and Location
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 549 - 566
  • [29] On the optimal resistance against mafia and distance fraud in distance-bounding protocols
    Gil-Pons, Reynaldo
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2023, 210 : 69 - 78
  • [30] A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems
    Fan, Xinxin
    Gong, Guang
    Engels, Daniel W.
    Smith, Eric M.
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 1083 - 1087