Location leakage in distance bounding: Why location privacy does not work

被引:9
作者
Mitrokotsa, Aikaterini [1 ]
Onete, Cristina [2 ]
Vaudenay, Serge [3 ]
机构
[1] Chalmers Univ Technol, S-41296 Gothenburg, Sweden
[2] Univ Rennes 1, IRISA INRIA, Rennes, France
[3] EPFL Lausanne, Lausanne, Switzerland
关键词
Location privacy; Distance-bounting; Authentication; Location indistinguishability; Relay attacks; ATTACKS;
D O I
10.1016/j.cose.2014.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeasure against such attacks; however, such protocols may leak information regarding the location of the prover and/or the verifier who run the distance-bounding protocol. In this paper, we consider a formal model for location privacy in the context of distance-bounding. In particular, our contributions are threefold: we first define a security game for location privacy in distance bounding; secondly, we define an adversarial model for this game, with two adversary classes; finally, we assess the feasibility of attaining location privacy for distance-bounding protocols. Concretely, we prove that for protocols with a beginning or a termination, it is theoretically impossible to achieve location privacy for either of the two adversary classes, in the sense that there always exists a polynomially-bounded adversary winning the security game. However, for so-called limited adversaries, who cannot see the location of arbitrary provers, carefully chosen parameters do, in practice, enable computational location privacy. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:199 / 209
页数:11
相关论文
共 35 条
[1]  
Aumasson J-P, 2011, P 13 INT C INF COMM
[2]  
Bay A, 2012, LECT NOTES COMPUTER
[3]  
Boureanu Ioana, 2012, Progress in Cryptology - LATINCRYPT 2012. Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, P100, DOI 10.1007/978-3-642-33481-8_6
[4]  
Boureanu I, 2013, EARLY SYMMETRIC CRYP, P52
[5]  
Boureanu I, 2013, LNCS IN PRESS
[6]  
Boureanu I., 2013, LNCS
[7]  
Boureanu I, 2013, P 2 INT WORKSH LIGHT
[8]  
Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
[9]  
Burmester M, 2012, LECT NOTES COMPUTER, V6805, P425
[10]  
Burmester M, 2011, LECT NOTES COMPUT SC, V7114, P4, DOI 10.1007/978-3-642-25867-1_2