Location Leakage in Distance Bounding: Why Location Privacy Does Not Work

In many cases, the authors can only have access to a service by proving they are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeasure against such attacks; however, such protocols may leak information regarding the location of the prover and/or the verifier who run the distance-bounding protocol.

Provided by: Chalmers University of Technology Topic: Security Date Added: Nov 2013 Format: PDF

Find By Topic