A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [31] A new privacy-preserving authentication protocol for anonymous web browsing
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    Cui, Hui
    Yang, Xuechao
    Nepal, Surya
    Huang, Xinyi
    Zeng, Yali
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21)
  • [32] Privacy-preserving Mutual Authentication Protocol for Drone Delivery Services
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2166 - 2171
  • [33] Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning
    Eltaras, Tamer
    Sabry, Farida
    Labda, Wadha
    Alzoubi, Khawla
    Malluhi, Qutaibah
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2977 - 2990
  • [34] An efficient privacy-preserving comparison protocol in smart metering systems
    Nateghizad M.
    Erkin Z.
    Lagendijk R.L.
    EURASIP Journal on Information Security, 2016 (1):
  • [35] A deeper look at Ariadne: a privacy-preserving network layer protocol
    Fressancourt, Antoine
    Iannone, Luigi
    Kerichard, Mael
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (11-12) : 745 - 762
  • [36] SpreadMeNot : A Provably Secure and Privacy-Preserving Contact Tracing Protocol
    Tedeschi, Pietro
    Bakiras, Spiridon
    Di Pietro, Roberto
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2500 - 2515
  • [37] Privacy-Preserving Statistics
    Vaidya, Jaideep
    COMPUTER, 2018, 51 (09) : 8 - 9
  • [38] Privacy-preserving compromised credential checking protocol for account protection
    Yu, Xiaopeng
    Tang, Dianhua
    Zhao, Zhen
    Zhao, Wei
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [39] Event Invitations in Privacy-Preserving DOSNs Formalization and Protocol Design
    Rodriguez-Cano, Guillermo
    Greschbach, Benjamin
    Buchegger, Sonja
    PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION, 2015, 457 : 185 - 200
  • [40] A privacy-preserving eHealth protocol compliant with the Belgian healthcare system
    De Decker, Bart
    Layouni, Mohamed
    Vangheluwe, Hans
    Verslype, Kristof
    PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 118 - +