Abstract
Determining the location and movement of objects or people is a core requirement in a number of embedded systems. To ensure that the location information gathered by embedded devices is accurate, the underlying method of location systems must be secure and reliable. This chapter provides an overview of the basic approaches for determining location information in embedded systems. The resilience of these methods against advanced attacks are discussed, along with proposals for securely verifying physical location estimates. Finally, the security aspects of global navigation space systems (GNSS) used for location information in embedded applications are briefly discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
C.A. Patterson, R.R. Muntz and C.M. Pancake. ‘Challenges in Location-Aware Computing’. IEEE Pervasive Computing, Vol. 2, No. 2, pp 80–89, June 2003.
A. Boukerche, H.A.B. Oliveira, E.F. Nakamura and A.A.F. Loureiro. ‘Secure Localization Algorithms for Wireless Sensor Networks’. IEEE Communications Magazine, Vol. 46, No. 4, pp 96–101, April 2008.
A.I.G-T. Ferreres, B.R. Alvarez and A.R. Garnacho. ‘Gauranteeing the Authenticity of Location Information’. IEEE Pervasive Computing, Vol. 7, No. 3, pp 72–79, July 2008.
Y. Zhou, Y. Fang and Y. Zhang. ‘Securing Wireless Sensor Networks: a Survey’. IEEE Communications Surveys & Tutorials, Vol. 10, No. 3, pp 6–28, September 2008.
X. Chen, K. Makki, K. Yen and N. Pissinou. ‘Sensor Network Security: A Survey’. IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, pp 52–73, 2009.
ISO/IEC 24730. Information technology - Real-time locating systems (RTLS).
N.O. Tippenhauer, K.B. Rasmussen, C. Popper and S. Čapkun. ‘Attacks on Public WLAN-based Positioning Systems’. Proceedings of ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.
G.P. Hancke, K. Mayes, and K. Markantonakis. ‘Confidence in Smart Token Proximity: Relay Attacks Revisited’. Elsevier Computers & Security, June 2009.
Y. Desmedt, C. Goutier and S. Bengio. ‘Special Uses and Abuses of the Fiat-Shamir Passport Protocol’. Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 293, pp. 21, 1987.
Y.C. Hu, A. Perrig and D.B. Johnson. ‘Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks’. Proceedings of INFOCOM, pp. 1976–1986, April 2003.
G.P. Hancke and M.G. Kuhn. ‘Attacks on “Time-of-Flight” Distance Bounding Channels’. Proceedings of First ACM Conference on Wireless, Network Security (WISEC’08), pp. 194–202, March 2008.
J. Clulow, G.P. Hancke, M.G. Kuhn, T. Moore. ‘So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4357, pp. 83–97, September 2006.
S. Brands and D. Chaum. ‘Distance Bounding Protocols’. Proceedings of Advances in Cryptology (EUROCYPT ’93), Springer-Verlag LNCS 765, pp 344–359, May 1993.
S. Čapkun and J-P. Hubaux. ‘Secure Positioning in Wireless Networks’. IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 221–232, February 2006.
A. Harter, A. Hopper, P. Steggles, A. Ward and Paul Webster. ‘The Anatomy of a Context-Aware Application’. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM’99, pp. 59–68, August 1999.
Z. Li, W. Trappe, Y. Zhang and B. Nath., ‘Robust Statistical Methods for Securing Wireless Localization in Sensor Networks’. Proceedings of the International Symposium on Information Processing in Sensor Networks, 2005.
L. Lazos and R. Poovendran. ‘SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks’ Proceedings of the 3rd ACM workshop on Wireless, Security, pp. 21–30, 2004.
L. Lazos and R. Poovendran, ‘Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks’. IEEE Journal on Selected Areas of, Communication, Vol. 24, No., pp. 233246. February 2006.
A. Alkassar, C. Stuble and A. Sadeghi. ‘Secure Object Identification: or Solving the Chess Grandmaster Problem’. Proceedings of New Security Paradigms, Workshop, pp. 77–85, 2003.
K.B. Rasmussen and S. Čapkun. ‘Implications of Radio Fingerprinting on the Security of Sensor Networks’. Proceedings of IEEE SecureComm, 2007.
B. Danev, T.S. Heydt-Benjamin and Srdjan Capkun. ‘Physical-layer Identification of RFID Devices’, Proceedings of USENIX Security Symposium, 2009.
B. Danev and S. Capkun. ‘Transient-based Identification of Wireless Sensor Nodes’. Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2009.
G. DeJean and D. Kirovski. ‘RF-DNA: Radio-Frequency Certificates of Authenticity’. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), Springer-Verlag LNCS 4727, pp. 346–363, September 2007.
M.G. Kuhn. ‘An Asymmetric Security Mechanism for Navigation Signals’. 6th Information Hiding Workshop, Springer-Verlag LNCS 3200, pp 239–252, May 2004.
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun and J-P Hubaux. ‘Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking’. IEEE Communications Magazine, February 2008.
N.O. Tippenhauer and S. Capkun. ‘ID-based Secure Distance Bounding and Localization’. Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009.
G.P. Hancke and M.G. Kuhn. ‘An RFID Distance Bounding Protocol’. Proceedings of IEEE/CreateNet SecureComm, pp. 67–73, September 2005.
J. Reid, J.M.G Nieto, T. Tang and B. Senadji. ‘Detecting Relay Attacks with Timing-Based Protocols’. Proceeding 2nd ACM Symposium on Information, Computer and Communications, Security, pp. 204–213, March 2007.
D. Singelée, B. Preneel. ‘Distance Bounding in Noisy Environments’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4572, pp. 101–115, 2007.
Drone Hijacking? Thats Just the Start of GPS Troubles. Wired.com, July 2012. http://www.wired.com/dangerroom/2012/07/drone-hijacking/all/
Vulneribility Assessment of the Transportation Infrastructure Relying on the Global Positioning System. John A. Volpe National Transportation Systems Center, 2001.
Global Navigation Space Systems: Reliance and Vulnerabilities, Royal Academy of Engineering, March 2011.
GNU Radio http://gnuradio.org
Ettus http://www.ettus.com
N.O. Tippenhauer, C. Popper, K.B. Rasmussen and S. Capkun. ‘On the Requirements for Successful GPS Spoofing Attacks’. Proceedings of ACM Communication and Computer Security (CCS), October 2011.
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O’Hanlon and P.M. Kintner. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of GNSS Conference, September 2008.
Military jamming of GPS in Scotland suspended. BBC, October 2011. http://www.bbc.co.uk/news/uk-scotland-highlands-islands-15242835
GPS Jamming: No Jam Tomorrow. The Economist, March 2011.
Galileo System Overview, European Space Agency. http://www.esa.int/esaNA/galileo.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Hancke, G.P. (2014). Security of Embedded Location Systems. In: Markantonakis, K., Mayes, K. (eds) Secure Smart Embedded Devices, Platforms and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7915-4_11
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7915-4_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7914-7
Online ISBN: 978-1-4614-7915-4
eBook Packages: Computer ScienceComputer Science (R0)