Skip to main content

LINK: Location Verification through Immediate Neighbors Knowledge

  • Conference paper

Abstract

In many location-based services, the user location is determined on the mobile device and then shared with the service. For this type of interaction, a major problem is how to prevent service abuse by malicious users who lie about their location. This paper proposes LINK (Location verification through Immediate Neighbors Knowledge), a location authentication protocol in which users help verify each other’s location claims. This protocol is independent of the wireless network carrier, and thus works for any third-party service. For each user’s location claim, a centralized Location Certification Authority (LCA) receives a number of verification messages from neighbors contacted by the claimer using short-range wireless networking such as Bluetooth. The LCA decides whether the claim is authentic or not based on spatio-temporal correlation between the users, trust scores associated with each user, and historical trends of the trust scores. LINK thwarts attacks from individual malicious claimers or malicious verifiers. Over time, it also detects attacks involving groups of colluding users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kindberg, T., Zhang, L., Shankar, N.: Context authentication using constrained channels. In: Proc. of WMCSA 2002, pp. 14–21 (2002)

    Google Scholar 

  2. Wullems, C., Pozzobon, O., Kubik, K.: Trust your receiver? Enhancing location security. GPS World 1, 23–30 (2004)

    Google Scholar 

  3. Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  4. Rasmussen, K., Čapkun, S.: Location privacy of distance bounding protocols. In: Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pp. 149–160 (October 2008)

    Google Scholar 

  5. Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Trans. Dependable Secur. Comput. 3(4), 377–385 (2006)

    Article  MATH  Google Scholar 

  6. Douceur, J.: The Sybil Attack. In: Proc. of IPTPS 2001, pp. 251–260 (2002)

    Google Scholar 

  7. Chu, X., Chen, X., Zhao, K., Liu, J.: Reputation and trust management in heterogeneous peer-to-peer networks. Springer Telecommunication Systems 44(3-4), 191–203 (2010)

    Article  Google Scholar 

  8. Talasila, M., Curtmola, R., Borcea, C.: LINK: Location-verification through immediate neighbors knowledge. Department of Computer Science, NJIT, Tech. Rep. (2010)

    Google Scholar 

  9. Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: Proc. of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), pp. 834–840 (November 2005)

    Google Scholar 

  10. Tippenhauer, N., Čapkun, S.: Id-based secure distance bounding and localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621–636. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Chiang, J.T., Haas, J., Hu, Y.-C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proc. of the 2nd ACM Conference on Wireless Network Security (WiSec 2009), pp. 181–192 (2009)

    Google Scholar 

  12. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the 2nd ACM Workshop on Wireless Security (Wise 2003), pp. 1–10 (2003)

    Google Scholar 

  13. Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Shmatikov, V., Wang, M.-H.: Secure verification of location claims with simultaneous distance modification. In: Proc. of the 12th Annual Asian Computing Science Conference (Asian 2007), pp. 181–195 (December 2007)

    Google Scholar 

  15. Manweiler, J., Scudellari, R., Cox, L.: SMILE: Encounter-based trust for mobile social services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 246–255. ACM, New York (2009)

    Google Scholar 

  16. Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: cooperative proximity-based authentication. In: Proc. of MobiSys 2010, pp. 331–344. ACM, New York (2010)

    Google Scholar 

  17. Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. In: Proc. of MobiHoc 2002, pp. 226–236 (2002)

    Google Scholar 

  18. Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, pp. 107–121 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Talasila, M., Curtmola, R., Borcea, C. (2012). LINK: Location Verification through Immediate Neighbors Knowledge. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29154-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29153-1

  • Online ISBN: 978-3-642-29154-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics