Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 30))

Abstract

Location based services (LBS) enable the wireless network operators to provide specific services to wireless users, based on their current locations. In a wireless network, users can connect from various physical locations, but their current location information is required to enable LBSs. Several localization schemes have been proposed earlier to estimate the location of a wireless user. However these schemes assume that none of the users in the system is malicious which might not always be true. This chapter presents a Secure Localiza-tion Algorithm (SLA) that can be implemented on current 802.11 infrastructure based wireless networks without the need for any additional specialized hardware. The scheme is based on the transmission of unique messages at different power levels from the access points. The user device receives a certain set of messages which it will have to transmit back to the access point. The location of the user device can be estimated securely based on this set of messages. We have investigated the properties of SLA using simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 229.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. E. Denning and P. F. MacDoran, “Location-based authentication: grounding cyberspace for better security,” Internet besieged: countering cyberspace scofflaws, pp. 167–174, 1998.

    Google Scholar 

  2. D. Hromin, M. Chladil, N. Vanatta, D. Naumann, W. Wetzel, F. Anjum, and R. Jain, “CodeBLUE: A bluetooth interactive dance club system,” IEEE Global Telecommunications Conference, vol. 5, pp. 2814–2818, December 2003.

    Google Scholar 

  3. T. Nadeem, L. Ji, A. Agrawala, and J. Agre, “Location enhancement to IEEE 802.11 DCF,” Proceedings of IEEE INFOCOM, vol. 1, pp. 651–663, March 2005.

    Google Scholar 

  4. M. G. Kuhn, “An asymmetric security mechanism for navigation signals,” Proceedings of the Information Hiding Workshop, 2004.

    Google Scholar 

  5. R. Anderson and M. Kuhn, “Tamper resistancea cautionary note,” Second USENIX Workshop on Electronic Commerce Proceedings, pp. 1–11, November 1996.

    Google Scholar 

  6. S. Capkun and J. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” Proceedings of IEEE INFOCOM, vol. 3, pp. 1917–1928, March 2005.

    Google Scholar 

  7. Proxim Corporation, ORiNOCO AP-2000 User Guide, http://www.proxim.com/products/wifi/ap/ap2000/.

    Google Scholar 

  8. N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The cricket location-support sys-tem,” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 32–43, August 2000.

    Google Scholar 

  9. R. Want, A. Hopper, V. Falco, and J. Gibbons, “The active badge location system,” ACM Transactions on Information Systems, vol. 10, no. 1, pp. 91–102, January 1992.

    Article  Google Scholar 

  10. Y. Gwon, R. Jain, and T. Kawahara, “Robust indoor location estimation of stationary and mobile users,” Proceedings of IEEE INFOCOM, vol. 2, pp. 1032–1043, March 2004.

    Google Scholar 

  11. S. Ganu, A. S. Krishnakumar, and P. Krishnan, “Infrastructure-based location estimation in wlan networks,” IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 1, pp. 465–470, March 2004.

    Google Scholar 

  12. P. Bahl and V. N. Padmanabhan, “RADAR: An in-building rf-based user location and tracking system,” Proceedings of IEEE INFOCOM, vol. 2, pp. 775–784, March 2000.

    Google Scholar 

  13. A. M. Ladd and et. al., “On the feasibility of using wireless ethernet for indoor localization,” IEEE Transactions on Robotics and Automation, vol. 20, no. 3, pp. 555–559, June 2004.

    Article  Google Scholar 

  14. L. Lazos and R. Poovendran, “SeRLoc: Secure range-independent localization for wire-less sensor networks,” Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe, pp. 21–30, October 2004.

    Google Scholar 

  15. P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A probabilistic room location service for wireless networked environments,” Proceedings of the 3rd international conference on Ubiquitous Computing, pp. 18–34, September 2001.

    Google Scholar 

  16. D. Madigan, E. Elnahrawy, R. P. Martin, W.-H. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” Proceedings of IEEE INFOCOM, vol. 2, pp. 1217–1227, March 2005.

    Google Scholar 

  17. M. Youssef and A. Agrawala, “The Horus WLAN location determination system,” Proceedings of the 3rd international conference on Mobile systems, applications, and services, pp. 205–218, June 2005.

    Google Scholar 

  18. S. Capkun, M. Srivastava, M. Cagalj, and J. Hubaux, “Securing positioning with covert base stations,” NESL-UCLA Technical Report, Tech. Rep., March 2005.

    Google Scholar 

  19. L. Lazos, S. Capkun, and R. Poovendran, “ROPE: Robust position estimation in wireless sensor network,” Proceedings of IPSN, April 2005.

    Google Scholar 

  20. Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), April 2005.

    Google Scholar 

  21. D. Liu, P. Ning, and W. Du, “Attack-resistant location estimation in sensor networks,” In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), pp. 99–106, April 2005.

    Google Scholar 

  22. N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” Proceedings of the Workshop on Wireless Security, pp. 1–10, 2003.

    Google Scholar 

  23. S. Pandey, B. Kim, F. Anjum, and P. Agrawal, “Client assisted location data acquisition scheme for secure enterprise wireless network,” IEEE Wireless Communications and Networking Conference, WCNC, vol. 2, pp. 1174–1179, March 2005.

    Article  Google Scholar 

  24. P. Tao, A. Rudys, A. M. Ladd, and D. S. Wallach, “Wireless LAN location-sensing for security applications,” Proceedings of the Workshop on Wireless Security, pp. 11–20, September 2003.

    Google Scholar 

  25. P. Calhoun, B. OHara, S. Kelly, R. Suri, D. Funato, and M. Vakulenko, “Light weight access point protocol (LWAPP),” IETF Internet Draft, draft-calhoun-seamoby-lwapp-03, June 2003.

    Google Scholar 

  26. D-Link, DWL-2100AP Data Sheet, ftp://ftp10.dlink.com/pdfs/products/DWL-2100AP/DWL2100AP_ds.pdf.

    Google Scholar 

  27. C. Dodson, P. Parker, and P. E. Parker, A User’s Guide to Algebraic Topology (Mathematics and Its Applications). Springer, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Pandey, S., Anjum, F., Agrawal, P. (2007). TRaVarSeL-Transmission Range Variation based Secure Localization. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-46276-9_9

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32721-1

  • Online ISBN: 978-0-387-46276-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics