1. Introduction
Distance bounding (DB) is the process that allows an entity called a
verifier to estimate a tight distance from its location to the location of a second entity called the
prover. Distance bounding can become an important cornerstone to face many access control problems requiring not only the verification of a user’s credentials but also its location (e.g., unlocking an automobile door or igniting a car engine). Here, the prover—who has a car key or token—needs to be close enough to the car lock in order to unlock it [
1]. Other applications, such as location-based routing, location-aided routing (LAR) [
2], distance routing effect algorithm for mobility (DREAM) [
3], and greedy perimeter stateless routing (GPSR) [
4] may be enhanced with DB. These protocols assume that mobile nodes are acting honestly and are forwarding messages only when they can get messages closer to their destination. Finally, other examples are location-based services (LBSs), which rely on the trustworthiness of the location provided by their users. Particularly, new companies like Placecast [
5] have focused their businesses on providing location verification services for location-based marketing companies. Placecast claims that more than 25% of the location-based advertisements are targeted improperly.
However, several works have highlighted the problem of invading a user’s privacy, since location information can be used to infer the user’s lifestyle and can present significant privacy and safety threats. This problem has actually motivated a series of research on location cloaking [
6,
7,
8,
9,
10,
11,
12,
13,
14]. The key idea of these proposed techniques is to reduce location resolution to achieve a desired level of protection. Instead of its precise location, a node discloses a geographic region as its location. This region, referred to as a cloaking region, contains the node’s current position and needs to satisfy other constraints, depending on the risks of concern.
A cloaking region must guarantee that its owner can be located at any position with similar likelihood. For example, for anonymous uses of location-based services (e.g., [
6,
7,
8]), a cloaking region needs to contain at least
K different nodes; for location privacy protection (e.g., [
9,
10,
13,
14]), a cloaking region must be visited by
K different users at different times; for location safety protection ([
11,
12]), node density in a cloaking region must not exceed some threshold.
However, the use of cloaked locations presents many challenges to most of the existing location-based applications. These services are often designed under the assumptions that the user (prover) is willing to (1) disclose its exact location and (2) allow the service provider (verifier) to localize its position as precisely as possible. These assumptions may not hold in reality for traditional distance bounding protocol. A DBP tries to achieve a tight bounding distance between the prover and verifier, and we show that this goal can potentially refine a node’s cloaked location.
The problem of distance bounding in wireless networks was initially investigated in [
15,
16] without taking cloaked locations into account. In these works, there are two nodes—the verifier (
V) and the prover (
P)—exchanging a series of challenges and responses. Based on the Radio Frequency (RF) propagation delay, the verifier computes a tight circular region containing the prover’s exact position. This result can be used by
V to accept a location claimed by
P only if such a location is within this tight circular region. These initial works also assume that the communication channel between
P and
V is reliable, meaning that all messages arrive to their destination. However, authors in [
17,
18] study the challenges faced in building a DB protocol when a lossy and noisy communication channel is present.
The DB problem has also been extended to support multiple provers (known as group distance bounding) [
19] and also to support multiple verifiers (known as secure positioning) [
20]. In this latter scenario, multiple verifiers are used to further narrow down the area where the prover is located. However in this article, we are considering the original scenario where a single verifier and prover are present, and a reliable channel is assumed. Thus, we can only achieve distance bounding but not secure positioning. Moreover, in this paper we assume a wireless propagation radio based on a binary disk model. That is, an ideal communication channel with circular covering ranges, completely reliable communication (so, no losses inside the covering range), and propagation times exclusively depending on the linear distance between the source and the destination.
In this paper, we consider the problem of preventing leaking location details about the prover when this node runs a DB protocol against only one verifier node. P claims to be inside a cloaking region, but V’s location is unknown. Node P is willing to run a DB protocol while providing a certain level of guarantee that its cloaking region will not be refined during the DB process. We consider a cloaking region as refined if the adversary (e.g., the verifier) can conclude that P must be in some region whose entropy is smaller than the one provided by its cloaking region. We present a location refinement attack, named as distance bounding attack (DBA). In this attack, V refines a cloaking region by measuring the round trip time of its communication with the prover.
An initial idea to tackle this problem is to let node P delay any message from V on purpose to seem to be further away. However, this approach has at least two drawbacks. Firstly, if node V knows some lower or upper bound of such a delay, then it can adjust the distance computed from the DBA and refine P’s cloaking region. Secondly, if such a delay is random but too large, node V may estimate a useless distance bounding for any location-based application. To overcome the aforementioned drawbacks, we propose a location-privacy-aware distance bounding protocol that limits the likelihood a cloaked location is refined. We show its effectiveness against DBA by measuring the number of successful location refinements when P and V run our protocol.
To the best of our knowledge, the state-of-the-art research on traditional DB assume some of the following conditions [
21,
22,
23,
24,
25,
26]. Node
P is willing to disclose its exact location to
V, and the adversary is a third party eavesdropping the communication between
P and
V. These works [
21,
22] show that a location-privacy leakage can arise when the adversary is able to infer location details about the prover and the verifier from the traffic. Moreover, authors in [
22] show that it is not possible to prevent location-privacy leakage in current DB protocols when multiple third parties are colluded and eavesdropping the traffic between
P and
V. However, the same authors claim that such a risk of leakage can at least be mitigated. Finally, other works [
23,
24,
25,
26] assume the same adversary model but they analyze DB protocols against a third party performing a man-in-the-middle attack (i.e., mafia, terrorist, or distance hijacking attacks).
However, our work is based on different assumptions and restrictions. First, node P is not willing to disclose an exact location but a cloaking region instead. Second, node P is willing to accept some loss of location-privacy only if this leakage is not greater than a node P’s threshold. Third, our adversary model assumes that our attacker is the same node V who wants to obtain more details about P’s whereabout. Lastly, we are addressing the distance bounding attack (DBA), which is different from those currently man-in-the-middle attacks studied in the literature.
The remainder of this paper is organized as follows. We discuss DBA in detail and present their solutions in
Section 2. The proposed distance bounding protocol is presented in
Section 3. We evaluate the effectiveness of our solution against DBA in
Section 4. Finally, we offer concluding remarks in
Section 5.
2. System Overview
We initially assume that there are two stationary nodes called the prover (
P) and the verifier (
V). Node
P is honest and does not know any details about node
V’s whereabouts. However, the location of
P is represented by a public cloaking region (
). This region includes
P’s exact location and must satisfy the location privacy and/or safety requirements demanded by
P.
can have any shape, but without loss of generality we assume that it is a circle centered at some point
and radius
. Many techniques have been proposed to compute a cloaking region [
12,
13,
14,
27,
28]. Our work does not assume that some specific technique should be used, but for the sake of simplicity we assume that there exists a trustworthy anonymizer (AS) in charge of computing cloaking regions.
Node
P claims to be at a certain location (
) and node
V runs a distance bounding protocol to validate this claim. We assume that node
P is willing to participate in this process, but it does not want node
V—the adversary—to increase the resolution of its location. We say that
P’s location has been refined if node
V can conclude there exists a sub-region where
P must be located whose entropy is smaller than the entropy of
. An entropy of a cloaking region can be computed as suggested by Nu et al. [
13].
Each node is equipped with an RF network interface operating with only one omni-directional antenna. An interface is used to either broadcast or receive a message. Due to the characteristics of this antenna, neither node
P nor node
V are able to determine the direction of an incoming message. Finally, we assume there is no collusion among nodes and a node’s processing time can be negligible with respect to the propagation time. Rasmussen et al. [
29] design a network interface for DB which can achieve processing time smaller than one nanosecond.
Although the goal of this paper is not to prevent location-privacy leakage when a third party is colluded with others, many complimentary techniques can be used to mitigate this attack. For example, either using low-power transmission to reduce the region where a message can be listened [
30], or using any scheme based on either FHSS (frequency-hopping spread spectrum) [
31] or DSSS [
21] (direct sequence spread spectrum). By using FHSS, the prover and the verifier can select a secret and pseudo random sequence of frequency channels beforehand. When a DB protocol is run,
V and
P can switch between these channels to prevent interception. Another alternative is by using DSSS, since any signal transmitted either by the prover or the verifier is spread over a large frequency band, then any third party might not been able to distinguish it from the channel background noise.
2.1. A Distance Bounding Attack
Suppose that nodes V and P exchange a series of challenge–response messages. Every time P replies immediately to a challenge, it may put its location privacy at risk. Node V measures the round-trip time between a challenge and its response, and concludes with an upper-bound on the distance to P. This upper-bound distance () is computed as half of the average round trip time multiplied by the speed of light. To conclude this attack, V overlaps a distance bounding circle, which is a circle centered at its position and radius , with P’s cloaking region, and concludes with more details about P’s location.
For example, consider the scenario represented by
Figure 1. In this case,
P replies immediately to a challenge sent from
V, and this latter node can conclude that all possible locations for
P are all points over the perimeter of
V’s distance bounding circle
that are also within
P’s cloaking region. If
P had added an intentional delay (
) to look more distant, then
V would have computed a longer distance bounding circle
. Since
V does not know the amount of delay added by
P, this node can only conclude that all locations within the colored area are the only feasible locations for
P. We say that node
V in
Figure 1 has been able to refine node
P’s location if the entropy of
is smaller than the entropy of
.
2.2. Thwarting a DBA
Since P wants to prevent location refinement when receiving a challenge from V, it can broadcast any reply only after having waited for a short time. There are many ways to choose this delay. One approach is to choose it to be equal to the maximum distance from V to the perimeter of (). P might think it can defeat DBA, however, since , then V might still be able to refine by subtracting from .
Another alternative way is to allow node
P to uniformly choose a secret random delay from an interval
. Galdames et al. [
32] proved that
can be computed as a function of the maximum probability of refinement tolerated by
P. However, the closer to zero this probability is, the larger
becomes. If node
V demands a tight upper-bound for
, it can happen that
P’s maximum probability of refinement may not be achieved.
Our idea to overcome the aforementioned drawbacks is to allow node P to request to the AS a second cloaking region denoted as . Node P must demand from the AS that knowledge of does not release any clue about the location and shape of . The only known fact is that is entirely located within . Without loss of generality, we assume is a circle centered at some point and radius .
Now, we say that P’s location has not been compromised or refined if and only if and have similar location anonymity and privacy features. Formally, we say that node P’s location has been successfully refined if and only if the entropy of is smaller than the entropy of .
In summary, a suitable location-privacy-aware DBP must ensure it completely covers and gives the minimum possible information to V, so cannot be refined.
3. Protocol Proposal
For our protocol, we propose the use of two cloaking regions: First, a private region , which will be only known by P; and second, a public region which is sent from P to V as its claimed location. Additionally, the answering time of P to the challenge of V is modified by adding a certain delay selected in an interval such that , where is the distance traveled by the electromagnetic signal at time , denotes the longest distance between P and ’s perimeter, and is ’s radius. Node V runs a DBA against P to verify P’s claimed position.
As is exemplified in
Figure 2, simple modifications to DBA allow
V to determine a region
C consisting of a ring-like region centered at
V and with width equal to
’s diameter, within which
P should be located. By intersecting
C and
, a first level of refining can be performed, determining a (refined) region
where
P should be located.
3.1. Metrics
The participation of
P in the protocol is subject to the level of refinement of region
R, which must be evaluated, and should not exceed a given tolerance factor
. To that, we define the metric
as the ratio between the entropy of
and the entropy of
, as described by Equation (
1):
For simplification purposes, said metric is simplified to the ratio between the areas of and , as the probability of P being in any place of is considered equally likely. Since P does not know the location of V, it assumes the worst situation of refinement to decide its participation in the DBP; i.e., V is located at the maximum possible distance from P on the axis intersecting the position of P and the center of , with between both nodes.
Node
P considers
,
, and the condition of maximum possible refinement in deciding whether or not to participate in the protocol; that is,
P will answer to
V’s challenge if
, as described by Equation (
2):
where the Area of
is determined by
P considering the condition of maximum possible refinement.
3.2. Protocol
The determination of the cloaking regions may require some information which is not available to P; therefore, we consider that such information is provided by an AS.
Given all of the above, we introduce the Distance Bounding Protocol Aware of Location Privacy (DBP-ALP) for static users, which is summarized in
Figure 3 and considers DBA as a procedure for
V to estimate its distance to
P.
User P determines the privacy and security criteria for the cloaking regions and . With those, it asks the AS entity to create both regions.
The AS answers P with the regions and .
User P determines the refinement level .
With the information of regions y , user P randomly selects the distance which defines the delay on the interval .
For the case of maximum possible refinement, user P decides to continue participating with V if condition is satisfied.
If the protocol is continued, P sends region to V.
V determines if region satisfies a practical minimum precision, and decides if it will continue with the protocol.
Through a DBA, V determines region C. During that process, P delays its answer by a given time .
V determines the region were P must be by intersecting regions and C.
5. Conclusions
This paper introduces a Distance Bounding Protocol Aware of the Location Privacy (DBP-ALP). The protocol allows participation in a distance bounding process between a prover P and a verifier V, along with consideration of a cloaking region protected against DBA refinements.
DBP-ALP allows both users P and V to leave the protocol execution if their participation conditions are not satisfied. On one hand, P may exit the protocol if its maximum refinement restriction is not satisfied. Such a decision is proposed to consider a metric concerning the relation between the entropies of the involved regions. On the other hand, V may leave the protocol if the cloaking region provided by P exceeds a usefulness size.
From the results, DBP-ALP provides full protection against refinement attempts when the radius of the public region exceeds twice the private region radius. Besides, participation average of both users are ensured in 96% when the ratio between the public and private radii exceeds . These results show that DBP-ALP is suitable for protecting the prover location privacy, along with respecting its refinement tolerance and a maximum distance criterion accepted by the verifier.
Our future efforts will be focused on the following points: to minimize the possibility that the user
P tries to validate a false location and to modify DBP-ALP in order to face a new adversary model consisting of a third party. This new party may perform either a mafia fraud attack or terrorist fraud attack [
23,
24,
25,
26]. Finally, a three-dimensional case subject to more real propagation models needs to be considered. Further studies will be focused on this challenging issue, as it represents a more realistic application scenario.