Location Leakage in Distance Bounding: Why Location Privacy Does Not Work

Provided by: Chalmers University of Technology
Topic: Security
Format: PDF
In many cases, the authors can only have access to a service by proving they are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeasure against such attacks; however, such protocols may leak information regarding the location of the prover and/or the verifier who run the distance-bounding protocol.

Find By Topic