Skip to main content

Designing and Verifying Core Protocols for Location Privacy

  • Conference paper
Book cover Information Security (ISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4176))

Included in the following conference series:

Abstract

Geographic privacy services provide location information on roaming targets to location recipients via location servers, in a way that protects the privacy of the individuals involved. In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF’s RFC 3693. Using the AVISPA tool, we check that these requirements, namely anonymity against the location server, as well as confidentiality, integrity, and authenticity of the location information, are actually met. In the design phase of such protocols, numerous variants are to be considered and evaluated. Here the use of model checkers turns out to be very helpful in exploring the security implications quickly and precisely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The AVISPA project homepage (2003), http://www.avispa-project.org/

  2. The AVISPA Tool (2005), Available at: http://www.avispa-project.org/

  3. HLPSL Tutorial: A Beginner’s Guide to Modelling and Analysing Internet Security Protocols, Available at: [AH-03] (2005)

    Google Scholar 

  4. AVISPA User Manual, Available at: [AH-03] (2005)

    Google Scholar 

  5. Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Mantovani, J., Mödersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. Automated Software Engineering, vol. 180, pp. 193–205. Austrian Computer Society, Austria (2004)

    Google Scholar 

  6. Cuellar, J., Morris, J., Mulligan, D., Peterson, J., Polk, J.: RFC 3693: geopriv requirements (2004), http://www.faqs.org/rfcs/rfc3693.html

  7. Danley, M., Mulligan, D., Morris, J., Peterson, J.: RFC 3694: Threat Analysis of the Geopriv Protocol (2004), http://www.faqs.org/rfcs/rfc3694.html

  8. Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)

    Google Scholar 

  9. IETF Working Group: Geographic location/privacy (geopriv) (2006), http://www.ietf.org/html.charters/geopriv-charter.html

  10. Liu, L.: Analyzing web service protocols with the AVISPA approach. M.Sc. thesis, Universität Karlsruhe and Siemens (2005)

    Google Scholar 

  11. Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW 1997), pp. 31–43. IEEE Computer Society Press, Los Alamitos (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

von Oheimb, D., Cuellar, J. (2006). Designing and Verifying Core Protocols for Location Privacy. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_36

Download citation

  • DOI: https://doi.org/10.1007/11836810_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38341-3

  • Online ISBN: 978-3-540-38343-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics