ABSTRACT
Due to the widespread adoption of the Global Positioning System (GPS), many systems have been designed to use the location information of participants. When these systems confer rights (such as access rights) based on location, such claim must be securely verified in order to prevent attackers from gaining access to resources that should be restricted. Substantial effort has been made on secure location verification; however, previous work does not address the impact of collusion attacks where adversaries share their private keys nor do they address a possible jamming attack where attackers inject a high amount of noise to prevent successful challenge and response receptions. In this paper, we propose a secure multilateration scheme that provides maximal security achievable by any time-of-flight based system that does not employ other verification methods.
- Stefan Brands and David Chaum. Distance-bounding protocols (extended abstract). In Theory and Application of Cryptographic Techniques, pages 344--359, 1993. Google ScholarDigital Library
- Laurent Bussard and Walid Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In SEC '05: 20th IFIP International Information Security Conference, Makuhari-Messe, Chiba, Japan, May 2005.Google ScholarCross Ref
- Gerhard P. Hancke. Practical attacks on proximity identification systems (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 328-333, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
- G.P. Hancke and M.G. Kuhn. An RFID distance bounding protocol. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005., pages 67--73, 05-09 Sept. 2005. Google ScholarDigital Library
- R. Jain, A. Puri, and R. Sengupta. Geographical routing using partial information for wireless ad hoc networks. Personal Communications, IEEE {see also IEEE Wireless Communications}, 8(1):48--57, Feb 2001.Google Scholar
- Tontong Li, Jian Ren, Qi Ling, and Anil Jain. Physical layer built-in security analysis and enhancement of cdma systems. In Proceedings of the Military Communications Conference, 2005. MILCOM 2005. IEEE, pages 956--962, October 2005.Google Scholar
- Julio C. Navas and Tomasz Imielinski. GeoCast: geographic addressing and routing. In MobiCom '97: Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, pages 66--76, New York, NY, USA, 1997. ACM. Google ScholarDigital Library
- Asher Peres and Daniel Terno. Quantum information and relativity theory. Reviews of Modern Physics, 76:93--123, Jan. 2004.Google ScholarCross Ref
- Kasper Bonne Rasmussen and Srdjan Čapkun. Implications of radio fingerprinting on the security of sensor networks. In SecureComm 2007: Proceedings of the 3rd international conference on security and privacy in communication networks, pages 29--37, 2007.Google Scholar
- Naveen Sastry, Umesh Shankar, and David Wagner. Secure verification of location claims. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), pages 1--10, September 2003. Google ScholarDigital Library
- D. Singelee and B. Preneel. Location verification using secure distance bounding protocols. In IEEE International Conference on Mobile Adhoc and Sensor Systems, 2005 (MASS 2005).Google ScholarCross Ref
- Frank Stajano. The resurrecting duckling -- what next? In Revised Papers from the 8th International Workshop on Security Protocols, pages 204--214, London, UK, 2001. Springer-Verlag. Google ScholarDigital Library
- Mario Strasser, Christina Popper, Srdjan Čapkun, and Mario Čagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2008. IEEE Computer Society. Google ScholarDigital Library
- S. Čapkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, 3:1917--1928 vol. 3, 13-17 March 2005.Google ScholarCross Ref
- S. Čapkun and J. P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), Feb 2006. Google ScholarDigital Library
- S. Čapkun, M. Srivastava, and M. Cagalj. Secure localization with hidden and mobile base stations. In IEEE Conference on Computer Communications (INFOCOM). IEEE, Apr 2006.Google ScholarCross Ref
- A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995. Google ScholarDigital Library
- Adnan Vora and Mikhail Nesterenko. Secure location verification using radio broadcast. IEEE Trans. Dependable Secur. Comput., 3(4):377--385, 2006. Google ScholarDigital Library
- Yan Yu, Ramesh Govindan, and Deborah Estrin. Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks. Technical report, UCLA Computer Science Department Technical Report, 2001.Google Scholar
- Secure and precise location verification using distance bounding and simultaneous multilateration
Recommendations
Distance Hijacking Attacks on Distance Bounding Protocols
SP '12: Proceedings of the 2012 IEEE Symposium on Security and PrivacyAfter several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are ...
Secure localization and location verification in wireless sensor networks: a survey
The locations of sensor nodes are very important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, attackers may attack the localization process to ...
Formal Analysis of Distance Bounding with Secure Hardware
Applied Cryptography and Network SecurityAbstractA distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats by malicious provers who try to convince that ...
Comments