Abstract
In many location-based services, the user location is determined on the mobile device and then shared with the service. For this type of interaction, a major problem is how to prevent service abuse by malicious users who lie about their location. This paper proposes LINK (Location verification through Immediate Neighbors Knowledge), a location authentication protocol in which users help verify each other’s location claims. This protocol is independent of the wireless network carrier, and thus works for any third-party service. For each user’s location claim, a centralized Location Certification Authority (LCA) receives a number of verification messages from neighbors contacted by the claimer using short-range wireless networking such as Bluetooth. The LCA decides whether the claim is authentic or not based on spatio-temporal correlation between the users, trust scores associated with each user, and historical trends of the trust scores. LINK thwarts attacks from individual malicious claimers or malicious verifiers. Over time, it also detects attacks involving groups of colluding users.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kindberg, T., Zhang, L., Shankar, N.: Context authentication using constrained channels. In: Proc. of WMCSA 2002, pp. 14–21 (2002)
Wullems, C., Pozzobon, O., Kubik, K.: Trust your receiver? Enhancing location security. GPS World 1, 23–30 (2004)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Rasmussen, K., Čapkun, S.: Location privacy of distance bounding protocols. In: Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pp. 149–160 (October 2008)
Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Trans. Dependable Secur. Comput. 3(4), 377–385 (2006)
Douceur, J.: The Sybil Attack. In: Proc. of IPTPS 2001, pp. 251–260 (2002)
Chu, X., Chen, X., Zhao, K., Liu, J.: Reputation and trust management in heterogeneous peer-to-peer networks. Springer Telecommunication Systems 44(3-4), 191–203 (2010)
Talasila, M., Curtmola, R., Borcea, C.: LINK: Location-verification through immediate neighbors knowledge. Department of Computer Science, NJIT, Tech. Rep. (2010)
Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: Proc. of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), pp. 834–840 (November 2005)
Tippenhauer, N., Čapkun, S.: Id-based secure distance bounding and localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621–636. Springer, Heidelberg (2009)
Chiang, J.T., Haas, J., Hu, Y.-C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proc. of the 2nd ACM Conference on Wireless Network Security (WiSec 2009), pp. 181–192 (2009)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the 2nd ACM Workshop on Wireless Security (Wise 2003), pp. 1–10 (2003)
Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391–407. Springer, Heidelberg (2009)
Shmatikov, V., Wang, M.-H.: Secure verification of location claims with simultaneous distance modification. In: Proc. of the 12th Annual Asian Computing Science Conference (Asian 2007), pp. 181–195 (December 2007)
Manweiler, J., Scudellari, R., Cox, L.: SMILE: Encounter-based trust for mobile social services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 246–255. ACM, New York (2009)
Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: cooperative proximity-based authentication. In: Proc. of MobiSys 2010, pp. 331–344. ACM, New York (2010)
Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. In: Proc. of MobiHoc 2002, pp. 226–236 (2002)
Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, pp. 107–121 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Talasila, M., Curtmola, R., Borcea, C. (2012). LINK: Location Verification through Immediate Neighbors Knowledge. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-29154-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29153-1
Online ISBN: 978-3-642-29154-8
eBook Packages: Computer ScienceComputer Science (R0)