Skip to main content

Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations)

  • Conference paper
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Part of the book series: Advances in Information Security ((ADIS,volume 30))

  • 918 Accesses

Abstract

In the last decade, researchers have proposed a number of localization and ranging techniques for wireless networks [2,5,12,26,39,40]. The use of these techniques is broad and ranges from enabling networking functions (i.e., location-based routing) to enabling location-related applications (e.g., access control, data harvesting).

The author acknowledges contributions from Mario Čagalj, Jean-Pierre Hubaux and Mani Srivastava to original publications [36–38] from which this chapter is compiled.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 229.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and M. Kuhn, “Tamper resistance-a cautionary note,” in Proceedings of the Second Usenix Workshop on Electronic Commerce, 1996.

    Google Scholar 

  2. P. Bahl and V. N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), vol. 2, 2000, pp. 775–784.

    Google Scholar 

  3. S. Brands and D. Chaum, “Distance-bounding protocols,” in Workshop on the theory and application of cryptographic techniques on Advances in cryptology. Springer-Verlag New York, Inc., 1994, pp. 344–359.

    Google Scholar 

  4. N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low cost outdoor localization for very small devices,” IEEE Personal Communications Magazine, vol. 7, no. 5, pp. 28–34, October 2000.

    Article  Google Scholar 

  5. P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A Probabilistic Room Location Service for Wireless Networked Environments,” in Proceedings of the Third International Conference Atlanta Ubiquitous Computing (Ubicomp), vol. 2201. Springer-Verlag Heidelberg, September 2001.

    Google Scholar 

  6. L. Doherty, K. Pister, and L. El Ghaoui, “Convex position estimation in wireless sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), April 2001.

    Google Scholar 

  7. T. Eren, D. Goldenberg, W. Whiteley, Y. Yang, A. Morse, B. Anderson, and P. Belhumeur, “Rigidity, computation, and randomization in network localization,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2004.

    Google Scholar 

  8. R. Fontana, “Experimental Results from an Ultra Wideband Precision Geolocation System,” Ultra-Wideband, Short-Pulse Electromagnetics, May 2000.

    Google Scholar 

  9. R. Fontana, E. Richley, and J. Barney, “Commercialization of an Ultra Wideband Precision Asset Location System,” in IEEE Conference on Ultra Wideband Systems and Technologies, November 2003.

    Google Scholar 

  10. I. Getting, “The Global Positioning System,” IEEE Spectrum, December 1993.

    Google Scholar 

  11. M. Gruteser and D. Grunwald, “Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis,” in Proceedings of WMASH, 2003.

    Google Scholar 

  12. I. Hightower, G. Boriello, and R. Want, “SpotON: An indoor 3D Location Sensing Technology Based on RF Signal Strength,” University of Washington, Tech. Rep. 2000-02-02, 2000.

    Google Scholar 

  13. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), San Francisco, USA, April 2003.

    Google Scholar 

  14. L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “Enhancing Wireless Location Privacy Using Silent Period,” in Proceedings of the IEEE Wireless Communications and Networking Conference(WCNC), 2005.

    Google Scholar 

  15. J. Kong and X. Hong, “ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks,” in Proceedings of MobiHoc, 2003.

    Google Scholar 

  16. J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, “Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), 2005.

    Google Scholar 

  17. M. G. Kuhn, “An Asymmetric Security Mechanism for Navigation Signals,” in Proceedings of the Information Hiding Workshop, 2004.

    Google Scholar 

  18. L. Lazos, S. Čapkun, and R. Poovendran, “ROPE: Robust Position Estimation in Wireless Sensor Networks,” in Proceedings of IPSN, 2005.

    Google Scholar 

  19. J.-Y. Lee and R. Scholtz, “Ranging in a Dense Multipath Environment Using an UWB Radio Link,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 9, December 2002.

    Google Scholar 

  20. Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wire-less Localization in Sensor Networks,” in Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.

    Google Scholar 

  21. D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” in Proceedings of the International Conference on Information Processing in Sensor Net-works (IPSN), 2005.

    Google Scholar 

  22. D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements,” in Proceedings of the ACM Conference on Networked Sensor Systems (SenSys). ACM Press, 2004, pp. 50–61.

    Google Scholar 

  23. D. Niculescu and B. Nath, “Ad hoc positioning system (aps) using aoa,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), San Francisco, USA, April 2003.

    Google Scholar 

  24. —, “DV Based Positioning in Ad hoc Networks,” Journal of Telecommunication Systems, vol. 22, no. 4, pp. 267–280, 2003.

    Google Scholar 

  25. V. V. Nostrand, Mathematics of Statistics. Princeton, NJ, 1962.

    Google Scholar 

  26. N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket location-support system,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). ACM Press, 2000, pp. 32–43.

    Google Scholar 

  27. A. R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” Pervasive Computing, January–March 2003.

    Google Scholar 

  28. I. W. Jackson, “Anonymous Addresses and Confidentiality of Location,” in Proceedings of International Workshop on Information Hiding, 1996.

    Google Scholar 

  29. M. G. Kendall and P.A.P. Moran, Geometrical Probability. Hafner, New York, 1963.

    MATH  Google Scholar 

  30. Y.-C. Hu and H. J. Wang, “Location Privacy in Wireless Networks,” in Proceedings of the ACM SIGCOMM Asia Workshop, 2005.

    Google Scholar 

  31. N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location claims,” in Proceedings of the ACM Workshop on Wireless Security (WiSe). ACM Press, September 2003, pp. 1–10.

    Google Scholar 

  32. A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in Ad-Hoc networks of sensors,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). ACM Press, 2001, pp. 166–179.

    Google Scholar 

  33. D. Shaw and W. Kinsner, “Multifractal Modeling of Radio Transmitter Transients for Gasification,” in Proceedings of the IEEE Conference on Communications, Power and Computing, May 1997, pp. 306–312.

    Google Scholar 

  34. S. Čapkun, L. Buttyán, and J.-P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, USA, October 2003.

    Google Scholar 

  35. S. Čapkun, M. Hamdi, and J.-P. Hubaux, “GPS-free Positioning in Mobile Ad-Hoc Net-works,” Cluster Computing, vol. 5, no. 2, April 2002.

    Google Scholar 

  36. S. Čapkun and J.-P. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2005.

    Google Scholar 

  37. S. Čapkun and J.-P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006.

    Google Scholar 

  38. S. Čapkun, M. Čagalj, and M. Srivastava, “Secure Localization with Hidden and Mobile Base Stations,” in Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2006.

    Google Scholar 

  39. R. Want, A. Hopper, V. Falcao, and J. Gibbons, “The Active Badge Location system,” ACM Transactions on Information Systems, vol. 10, no. 1, pp. 91–102, 1992.

    Article  Google Scholar 

  40. A. Ward, A. Jones, and A. Hopper, “A New Location Technique for the Active Office,” IEEE Personal Communications, vol. 4, no. 5, October 1997.

    Google Scholar 

  41. J. S. Warner and R. G. Johnston, “Think GPS Cargo Tracking = High Security? Think Again,” Technical report, Los Alamos National Laboratory, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Čapkun, S. (2007). Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations) . In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-46276-9_11

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32721-1

  • Online ISBN: 978-0-387-46276-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics