Location Privacy of Distance Bounding Protocols

Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As such, distance bounding protocols are executed frequently, e.g., to keep node locations up to date, etc. We analyze dist...

Full description

Bibliographic Details
Main Authors: Rasmussen, K, Čapkun, S
Format: Conference item
Published: ACM 2008
_version_ 1826289644578275328
author Rasmussen, K
Čapkun, S
author_facet Rasmussen, K
Čapkun, S
author_sort Rasmussen, K
collection OXFORD
description Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As such, distance bounding protocols are executed frequently, e.g., to keep node locations up to date, etc. We analyze distance bounding protocols in terms of their location privacy and we show that they leak information about the location and distance between communicating partners even to passive attackers. This location and distance information may be highly sensitive since it can form the basis for access control, key establishment, or be used as input to location aware applications. We analyze, in a number of scenarios, how much information distance bounding protocols leak. We further discuss several straightforward countermeasures and show why they do not provide adequate protection against distance leakage. Finally, we propose a location private distance bounding protocol that maintains the properties of existing distance bounding protocols while leaking no information about the distance measured between the communicating parties.
first_indexed 2024-03-07T02:32:02Z
format Conference item
id oxford-uuid:a790db88-5eaa-4b71-99fa-e824c71e0664
institution University of Oxford
last_indexed 2024-03-07T02:32:02Z
publishDate 2008
publisher ACM
record_format dspace
spelling oxford-uuid:a790db88-5eaa-4b71-99fa-e824c71e06642022-03-27T02:55:27ZLocation Privacy of Distance Bounding ProtocolsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:a790db88-5eaa-4b71-99fa-e824c71e0664Department of Computer ScienceACM2008Rasmussen, KČapkun, SDistance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As such, distance bounding protocols are executed frequently, e.g., to keep node locations up to date, etc. We analyze distance bounding protocols in terms of their location privacy and we show that they leak information about the location and distance between communicating partners even to passive attackers. This location and distance information may be highly sensitive since it can form the basis for access control, key establishment, or be used as input to location aware applications. We analyze, in a number of scenarios, how much information distance bounding protocols leak. We further discuss several straightforward countermeasures and show why they do not provide adequate protection against distance leakage. Finally, we propose a location private distance bounding protocol that maintains the properties of existing distance bounding protocols while leaking no information about the distance measured between the communicating parties.
spellingShingle Rasmussen, K
Čapkun, S
Location Privacy of Distance Bounding Protocols
title Location Privacy of Distance Bounding Protocols
title_full Location Privacy of Distance Bounding Protocols
title_fullStr Location Privacy of Distance Bounding Protocols
title_full_unstemmed Location Privacy of Distance Bounding Protocols
title_short Location Privacy of Distance Bounding Protocols
title_sort location privacy of distance bounding protocols
work_keys_str_mv AT rasmussenk locationprivacyofdistanceboundingprotocols
AT capkuns locationprivacyofdistanceboundingprotocols