Abstract
Location based services (LBS) enable the wireless network operators to provide specific services to wireless users, based on their current locations. In a wireless network, users can connect from various physical locations, but their current location information is required to enable LBSs. Several localization schemes have been proposed earlier to estimate the location of a wireless user. However these schemes assume that none of the users in the system is malicious which might not always be true. This chapter presents a Secure Localiza-tion Algorithm (SLA) that can be implemented on current 802.11 infrastructure based wireless networks without the need for any additional specialized hardware. The scheme is based on the transmission of unique messages at different power levels from the access points. The user device receives a certain set of messages which it will have to transmit back to the access point. The location of the user device can be estimated securely based on this set of messages. We have investigated the properties of SLA using simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
D. E. Denning and P. F. MacDoran, “Location-based authentication: grounding cyberspace for better security,” Internet besieged: countering cyberspace scofflaws, pp. 167–174, 1998.
D. Hromin, M. Chladil, N. Vanatta, D. Naumann, W. Wetzel, F. Anjum, and R. Jain, “CodeBLUE: A bluetooth interactive dance club system,” IEEE Global Telecommunications Conference, vol. 5, pp. 2814–2818, December 2003.
T. Nadeem, L. Ji, A. Agrawala, and J. Agre, “Location enhancement to IEEE 802.11 DCF,” Proceedings of IEEE INFOCOM, vol. 1, pp. 651–663, March 2005.
M. G. Kuhn, “An asymmetric security mechanism for navigation signals,” Proceedings of the Information Hiding Workshop, 2004.
R. Anderson and M. Kuhn, “Tamper resistancea cautionary note,” Second USENIX Workshop on Electronic Commerce Proceedings, pp. 1–11, November 1996.
S. Capkun and J. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” Proceedings of IEEE INFOCOM, vol. 3, pp. 1917–1928, March 2005.
Proxim Corporation, ORiNOCO AP-2000 User Guide, http://www.proxim.com/products/wifi/ap/ap2000/.
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The cricket location-support sys-tem,” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 32–43, August 2000.
R. Want, A. Hopper, V. Falco, and J. Gibbons, “The active badge location system,” ACM Transactions on Information Systems, vol. 10, no. 1, pp. 91–102, January 1992.
Y. Gwon, R. Jain, and T. Kawahara, “Robust indoor location estimation of stationary and mobile users,” Proceedings of IEEE INFOCOM, vol. 2, pp. 1032–1043, March 2004.
S. Ganu, A. S. Krishnakumar, and P. Krishnan, “Infrastructure-based location estimation in wlan networks,” IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 1, pp. 465–470, March 2004.
P. Bahl and V. N. Padmanabhan, “RADAR: An in-building rf-based user location and tracking system,” Proceedings of IEEE INFOCOM, vol. 2, pp. 775–784, March 2000.
A. M. Ladd and et. al., “On the feasibility of using wireless ethernet for indoor localization,” IEEE Transactions on Robotics and Automation, vol. 20, no. 3, pp. 555–559, June 2004.
L. Lazos and R. Poovendran, “SeRLoc: Secure range-independent localization for wire-less sensor networks,” Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe, pp. 21–30, October 2004.
P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A probabilistic room location service for wireless networked environments,” Proceedings of the 3rd international conference on Ubiquitous Computing, pp. 18–34, September 2001.
D. Madigan, E. Elnahrawy, R. P. Martin, W.-H. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” Proceedings of IEEE INFOCOM, vol. 2, pp. 1217–1227, March 2005.
M. Youssef and A. Agrawala, “The Horus WLAN location determination system,” Proceedings of the 3rd international conference on Mobile systems, applications, and services, pp. 205–218, June 2005.
S. Capkun, M. Srivastava, M. Cagalj, and J. Hubaux, “Securing positioning with covert base stations,” NESL-UCLA Technical Report, Tech. Rep., March 2005.
L. Lazos, S. Capkun, and R. Poovendran, “ROPE: Robust position estimation in wireless sensor network,” Proceedings of IPSN, April 2005.
Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), April 2005.
D. Liu, P. Ning, and W. Du, “Attack-resistant location estimation in sensor networks,” In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), pp. 99–106, April 2005.
N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” Proceedings of the Workshop on Wireless Security, pp. 1–10, 2003.
S. Pandey, B. Kim, F. Anjum, and P. Agrawal, “Client assisted location data acquisition scheme for secure enterprise wireless network,” IEEE Wireless Communications and Networking Conference, WCNC, vol. 2, pp. 1174–1179, March 2005.
P. Tao, A. Rudys, A. M. Ladd, and D. S. Wallach, “Wireless LAN location-sensing for security applications,” Proceedings of the Workshop on Wireless Security, pp. 11–20, September 2003.
P. Calhoun, B. OHara, S. Kelly, R. Suri, D. Funato, and M. Vakulenko, “Light weight access point protocol (LWAPP),” IETF Internet Draft, draft-calhoun-seamoby-lwapp-03, June 2003.
D-Link, DWL-2100AP Data Sheet, ftp://ftp10.dlink.com/pdfs/products/DWL-2100AP/DWL2100AP_ds.pdf.
C. Dodson, P. Parker, and P. E. Parker, A User’s Guide to Algebraic Topology (Mathematics and Its Applications). Springer, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Pandey, S., Anjum, F., Agrawal, P. (2007). TRaVarSeL-Transmission Range Variation based Secure Localization. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-46276-9_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32721-1
Online ISBN: 978-0-387-46276-9
eBook Packages: Computer ScienceComputer Science (R0)