A Note on a Privacy-Preserving Distance-Bounding Protocol

被引:0
|
作者
Aumasson, Jean-Philippe
Mitrokotsa, Aikaterini
Pens-Lopez, Pedro
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY | 2011年 / 7043卷
关键词
wireless communication; distance bounding; privacy; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Capkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface.
引用
收藏
页码:78 / 92
页数:15
相关论文
共 50 条
  • [41] A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications
    Languell, Zachary P.
    Gu, Qijun
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 35 (04) : 825 - 842
  • [42] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [43] A Distance Measure for Privacy-Preserving Process Mining Based on Feature Learning
    Roesel, Fabian
    Fahrenkog-Petersen, Stephan A.
    van der Aa, Han
    Weidlich, Matthias
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2021, 2022, 436 : 73 - 85
  • [44] Privacy-preserving SVANETs Privacy-preserving Simple Vehicular Ad-hoc Networks
    Hajny, Jan
    Malina, Lukas
    Martinasek, Zdenek
    Zeman, Vaclav
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 267 - 274
  • [45] A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection
    Mustafa, Mustafa A.
    Cleemput, Sara
    Aly, Abdelrahaman
    Abidin, Aysajan
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) : 6481 - 6490
  • [46] Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs
    Horng, Shi-Jinn
    Tzeng, Shiang-Feng
    Wang, Xian
    Qiao, Shaojie
    Gong, Xun
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1445 - 1454
  • [47] A Scalable Privacy-preserving Protocol for RFID-Based Supply Chain
    Mao, Dongmei
    Wu, Baofeng
    Wang, Liangmin
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [48] An MPC-based Protocol for Secure and Privacy-Preserving Smart Metering
    Mustafa, A. Mustafa
    Cleemput, Sara
    Aly, Abdelrahaman
    Abidin, Aysajan
    2017 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2017,
  • [49] A privacy-preserving efficient RFID authentication protocol from SLPN assumption
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 10 (03) : 234 - 243
  • [50] Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs
    Xiong, Hu
    Chen, Jinhao
    Mei, Qian
    Zhao, Yanan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2089 - 2104