Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Location leakage in distance bounding: Why location privacy does not work
 
research article

Location leakage in distance bounding: Why location privacy does not work

Mitrokotsa, Aikaterini  
•
Onete, Cristina
•
Vaudenay, Serge  
2014
Computers & Security

In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeasure against such attacks; however, such protocols may leak information regarding the location of the prover and/or the verifier who run the distance-bounding protocol. In this paper, we consider a formal model for location privacy in the context of distance-bounding. In particular, our contributions are threefold: we first define a security game for location privacy in distance bounding; secondly, we define an adversarial model for this game, with two adversary classes; finally, we assess the feasibility of attaining location privacy for distance-bounding protocols. Concretely, we prove that for protocols with a beginning or a termination, it is theoretically impossible to achieve location privacy for either of the two adversary classes, in the sense that there always exists a polynomially-bounded adversary winning the security game. However, for so-called limited adversaries, who cannot see the location of arbitrary provers, carefully chosen parameters do, in practice, enable computational location privacy. (C) 2014 Elsevier Ltd. All rights reserved.

  • Details
  • Metrics
Type
research article
DOI
10.1016/j.cose.2014.06.001
Web of Science ID

WOS:000341340600014

Author(s)
Mitrokotsa, Aikaterini  
Onete, Cristina
Vaudenay, Serge  
Date Issued

2014

Publisher

Elsevier

Published in
Computers & Security
Volume

45

Start page

199

End page

209

Subjects

Location privacy

•

Distance-bounting

•

Authentication

•

Location indistinguishability

•

Relay attacks

URL

URL

http://eprint.iacr.org/2013/776
Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Available on Infoscience
October 23, 2014
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/107716
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés