Advertisement

Secure Verification of Location Claims with Simultaneous Distance Modification

  • Vitaly Shmatikov
  • Ming-Hsiu Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4846)

Abstract

We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols satisfying the SDM property, a malicious device can lie about its distance from the verifiers, but all distances can only be altered by the same amount. We demonstrate that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device. We also present several lightweight localization protocols that satisfy the SDM property.

Keywords

Sensor Network Mobile Device True Location Localization Protocol Beacon Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BC93]
    Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)Google Scholar
  2. [BHE00]
    Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low cost outdoor localization for very small devices. Technical Report 00-729, Computer Science Department, University of Southern California (April 2000)Google Scholar
  3. [BP00]
    Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2) (2000)Google Scholar
  4. [ČČS06]
    Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: INFOCOM (2006)Google Scholar
  5. [ČH05]
    Čapkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM (2005)Google Scholar
  6. [CHKM06]
    Clulow, J., Hancke, G., Kuhn, M., Moore, T.: So near and yet so far: distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. [DFN06]
    Du, W., Fang, L., Ning, P.: LAD: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7), 874–886 (2006)zbMATHCrossRefGoogle Scholar
  8. [FRB03]
    Fontana, R., Richley, E., Barney, J.: Commercialization of an ultra wideband precision asset location system. In: IEEE Conf. on Ultra Wideband Systems and Technologies (2003)Google Scholar
  9. [HHB+03]
    He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: MOBICOM (2003)Google Scholar
  10. [HK05]
    Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: SecureComm (2005)Google Scholar
  11. [HWLC97]
    Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, Heidelberg (1997)Google Scholar
  12. [LND05a]
    Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: IPSN (2005)Google Scholar
  13. [LND05b]
    Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: ICDCS (2005)Google Scholar
  14. [LOR06]
    LORAN. LORAN-C general information (2006), http://www.navcen.uscg.gov/loran/
  15. [LP05]
    Lazos, L., Poovendran, R.: SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sensor Networks 1(1), 73–100 (2005)CrossRefGoogle Scholar
  16. [LPČ05]
    Lazos, L., Poovendran, R., Čapkun, S.: ROPE: Robust position estimation in wireless sensor networks. In: IPSN (2005)Google Scholar
  17. [MSC06]
    Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: SecureComm (2006)Google Scholar
  18. [NN03a]
    Niculescu, D., Nath, B.: Ad hoc positioning system (APS) using AoA. In: INFOCOM (2003)Google Scholar
  19. [NN03b]
    Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. J. Telecommunication Systems (2003)Google Scholar
  20. [PCB00]
    Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: MOBICOM (2000)Google Scholar
  21. [Rap96]
    Rappaport, T.: Wireless Communications: Principle and Practice. Prentice-Hall, Englewood Cliffs (1996)Google Scholar
  22. [SHS01]
    Savvides, A., Han, C.-C., Srivastava, M.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Mobile Computing and Networking, pp. 166–179 (2001)Google Scholar
  23. [SSW03]
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: WiSe (2003)Google Scholar
  24. [WF03]
    Waters, B., Felten, E.: Secure, private proofs of location. Technical Report 667-03, Department of Computer Science, Princeton University (January 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Vitaly Shmatikov
    • 1
  • Ming-Hsiu Wang
    • 1
  1. 1.The University of Texas at Austin 

Personalised recommendations