Advertisement

Security of Embedded Location Systems

  • G. P. HanckeEmail author
Chapter

Abstract

Determining the location and movement of objects or people is a core requirement in a number of embedded systems. To ensure that the location information gathered by embedded devices is accurate, the underlying method of location systems must be secure and reliable. This chapter provides an overview of the basic approaches for determining location information in embedded systems. The resilience of these methods against advanced attacks are discussed, along with proposals for securely verifying physical location estimates. Finally, the security aspects of global navigation space systems (GNSS) used for location information in embedded applications are briefly discussed.

Keywords

Global Position System Global Navigation Satellite System Location System Embed System Receive Signal Strength 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    C.A. Patterson, R.R. Muntz and C.M. Pancake. ‘Challenges in Location-Aware Computing’. IEEE Pervasive Computing, Vol. 2, No. 2, pp 80–89, June 2003.Google Scholar
  2. 2.
    A. Boukerche, H.A.B. Oliveira, E.F. Nakamura and A.A.F. Loureiro. ‘Secure Localization Algorithms for Wireless Sensor Networks’. IEEE Communications Magazine, Vol. 46, No. 4, pp 96–101, April 2008.Google Scholar
  3. 3.
    A.I.G-T. Ferreres, B.R. Alvarez and A.R. Garnacho. ‘Gauranteeing the Authenticity of Location Information’. IEEE Pervasive Computing, Vol. 7, No. 3, pp 72–79, July 2008.Google Scholar
  4. 4.
    Y. Zhou, Y. Fang and Y. Zhang. ‘Securing Wireless Sensor Networks: a Survey’. IEEE Communications Surveys & Tutorials, Vol. 10, No. 3, pp 6–28, September 2008.Google Scholar
  5. 5.
    X. Chen, K. Makki, K. Yen and N. Pissinou. ‘Sensor Network Security: A Survey’. IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, pp 52–73, 2009.Google Scholar
  6. 6.
    ISO/IEC 24730. Information technology - Real-time locating systems (RTLS).Google Scholar
  7. 7.
    N.O. Tippenhauer, K.B. Rasmussen, C. Popper and S. Čapkun. ‘Attacks on Public WLAN-based Positioning Systems’. Proceedings of ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.Google Scholar
  8. 8.
    G.P. Hancke, K. Mayes, and K. Markantonakis. ‘Confidence in Smart Token Proximity: Relay Attacks Revisited’. Elsevier Computers & Security, June 2009.Google Scholar
  9. 9.
    Y. Desmedt, C. Goutier and S. Bengio. ‘Special Uses and Abuses of the Fiat-Shamir Passport Protocol’. Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 293, pp. 21, 1987.Google Scholar
  10. 10.
    Y.C. Hu, A. Perrig and D.B. Johnson. ‘Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks’. Proceedings of INFOCOM, pp. 1976–1986, April 2003.Google Scholar
  11. 11.
    G.P. Hancke and M.G. Kuhn. ‘Attacks on “Time-of-Flight” Distance Bounding Channels’. Proceedings of First ACM Conference on Wireless, Network Security (WISEC’08), pp. 194–202, March 2008.Google Scholar
  12. 12.
    J. Clulow, G.P. Hancke, M.G. Kuhn, T. Moore. ‘So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4357, pp. 83–97, September 2006.Google Scholar
  13. 13.
    S. Brands and D. Chaum. ‘Distance Bounding Protocols’. Proceedings of Advances in Cryptology (EUROCYPT ’93), Springer-Verlag LNCS 765, pp 344–359, May 1993.Google Scholar
  14. 14.
    S. Čapkun and J-P. Hubaux. ‘Secure Positioning in Wireless Networks’. IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 221–232, February 2006.Google Scholar
  15. 15.
    A. Harter, A. Hopper, P. Steggles, A. Ward and Paul Webster. ‘The Anatomy of a Context-Aware Application’. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM’99, pp. 59–68, August 1999.Google Scholar
  16. 16.
    Z. Li, W. Trappe, Y. Zhang and B. Nath., ‘Robust Statistical Methods for Securing Wireless Localization in Sensor Networks’. Proceedings of the International Symposium on Information Processing in Sensor Networks, 2005.Google Scholar
  17. 17.
    L. Lazos and R. Poovendran. ‘SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks’ Proceedings of the 3rd ACM workshop on Wireless, Security, pp. 21–30, 2004.Google Scholar
  18. 18.
    L. Lazos and R. Poovendran, ‘Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks’. IEEE Journal on Selected Areas of, Communication, Vol. 24, No., pp. 233246. February 2006.Google Scholar
  19. 19.
    A. Alkassar, C. Stuble and A. Sadeghi. ‘Secure Object Identification: or Solving the Chess Grandmaster Problem’. Proceedings of New Security Paradigms, Workshop, pp. 77–85, 2003.Google Scholar
  20. 20.
    K.B. Rasmussen and S. Čapkun. ‘Implications of Radio Fingerprinting on the Security of Sensor Networks’. Proceedings of IEEE SecureComm, 2007.Google Scholar
  21. 21.
    B. Danev, T.S. Heydt-Benjamin and Srdjan Capkun. ‘Physical-layer Identification of RFID Devices’, Proceedings of USENIX Security Symposium, 2009.Google Scholar
  22. 22.
    B. Danev and S. Capkun. ‘Transient-based Identification of Wireless Sensor Nodes’. Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2009.Google Scholar
  23. 23.
    G. DeJean and D. Kirovski. ‘RF-DNA: Radio-Frequency Certificates of Authenticity’. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), Springer-Verlag LNCS 4727, pp. 346–363, September 2007.Google Scholar
  24. 24.
    M.G. Kuhn. ‘An Asymmetric Security Mechanism for Navigation Signals’. 6th Information Hiding Workshop, Springer-Verlag LNCS 3200, pp 239–252, May 2004.Google Scholar
  25. 25.
    P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun and J-P Hubaux. ‘Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking’. IEEE Communications Magazine, February 2008.Google Scholar
  26. 26.
    N.O. Tippenhauer and S. Capkun. ‘ID-based Secure Distance Bounding and Localization’. Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009.Google Scholar
  27. 27.
    G.P. Hancke and M.G. Kuhn. ‘An RFID Distance Bounding Protocol’. Proceedings of IEEE/CreateNet SecureComm, pp. 67–73, September 2005.Google Scholar
  28. 28.
    J. Reid, J.M.G Nieto, T. Tang and B. Senadji. ‘Detecting Relay Attacks with Timing-Based Protocols’. Proceeding 2nd ACM Symposium on Information, Computer and Communications, Security, pp. 204–213, March 2007.Google Scholar
  29. 29.
    D. Singelée, B. Preneel. ‘Distance Bounding in Noisy Environments’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4572, pp. 101–115, 2007.Google Scholar
  30. 30.
    Drone Hijacking? Thats Just the Start of GPS Troubles. Wired.com, July 2012. http://www.wired.com/dangerroom/2012/07/drone-hijacking/all/
  31. 31.
    Vulneribility Assessment of the Transportation Infrastructure Relying on the Global Positioning System. John A. Volpe National Transportation Systems Center, 2001.Google Scholar
  32. 32.
    Global Navigation Space Systems: Reliance and Vulnerabilities, Royal Academy of Engineering, March 2011.Google Scholar
  33. 33.
  34. 34.
  35. 35.
    N.O. Tippenhauer, C. Popper, K.B. Rasmussen and S. Capkun. ‘On the Requirements for Successful GPS Spoofing Attacks’. Proceedings of ACM Communication and Computer Security (CCS), October 2011.Google Scholar
  36. 36.
    T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O’Hanlon and P.M. Kintner. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of GNSS Conference, September 2008.Google Scholar
  37. 37.
    Military jamming of GPS in Scotland suspended. BBC, October 2011. http://www.bbc.co.uk/news/uk-scotland-highlands-islands-15242835
  38. 38.
    GPS Jamming: No Jam Tomorrow. The Economist, March 2011.Google Scholar
  39. 39.
    Galileo System Overview, European Space Agency. http://www.esa.int/esaNA/galileo.html

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Information Security Group, Smart Card Centre, Royal HollowayUniversity of LondonLondonUK

Personalised recommendations