Next Article in Journal
Highly Stable and Flexible Pressure Sensors with Modified Multi-Walled Carbon Nanotube/Polymer Composites for Human Monitoring
Previous Article in Journal
Wearable Sensors and the Assessment of Frailty among Vulnerable Older Adults: An Observational Cohort Study
Open AccessArticle

A Distance Bounding Protocol for Location-Cloaked Applications

1
Magister en Ciencias de la Computación, Universidad del Bío-Bío, Concepción 4051381, Chile
2
Departamento de Ciencias de la Computación, Universidad del Bío-Bío, Concepción 4051381, Chile
3
Departamento de Ingeniería Eléctrica y Electrónica, Universidad del Bío-Bío, Concepción 4051381, Chile
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2018, 18(5), 1337; https://doi.org/10.3390/s18051337
Received: 14 March 2018 / Revised: 4 April 2018 / Accepted: 5 April 2018 / Published: 26 April 2018
(This article belongs to the Section Sensor Networks)
Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked locations. For example, a traditional distance bounding protocol (DBP)—which is run by two nodes called the prover and the verifier—may conclude an untight and useless distance between these two entities. An LBS (verifier) may use this distance as a metric of usefulness and trustworthiness of the location claimed by the user (prover). However, we show that if a tight distance is desired, traditional DBP can refine a user’s cloaked location and compromise its location privacy. To find a proper balance, we propose a location-privacy-aware DBP protocol. Our solution consists of adding some small delays before submitting any user’s response. We show that several issues arise when a certain delay is chosen, and we propose some solutions. The effectiveness of our techniques in balancing location refinement and utility is demonstrated through simulation. View Full-Text
Keywords: location verification; location privacy; location refinement; wireless ad-hoc networks location verification; location privacy; location refinement; wireless ad-hoc networks
Show Figures

Figure 1

MDPI and ACS Style

Molina-Martínez, C.; Galdames, P.; Duran-Faundez, C. A Distance Bounding Protocol for Location-Cloaked Applications. Sensors 2018, 18, 1337.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop