Abstract
Since IoT devices have small computing power and limited battery size, it is desirable that the number of communications be as small as possible. To solve such a request, we propose a calculation method based on triangulation. The feature of our method is that the number of communications is one round trip, and sufficient computational security is realized with small entropy secret information using W-OTS+ and HMAC. In this paper, “small entropy” means a 8-digit integer (about 24 [bit]) that can be memorized by humans. We show an example calculation and analyze the relationship between accuracy of position measurement and security. From the results, we conclude that our method has sufficient security and enough practicality using small entropy secret information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_1
Advanced Google Maps Distance Calculator. https://www.daftlogic.com/projects-advanced-google-maps-distance-calculator.htm
Bluetooth SIG. https://www.bluetooth.com
The Christian Science: Exclusive: Iran hijacked US drone, says Iranian engineer. https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer
Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24654-1_13
Google maps with my location. http://www.google.com/ mobile/gmm/mylocation/index.html
Geodetic Reference System 1980 (GRS80), Bulletin Geodesique, Vol 54:3, 1980. Republished (with corrections) in Moritz, H., 2000,"Geodetic Reference System 1980," J. Geod. 74(1), pp. 128–162
Hülsing, A.: W-OTS+ – shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173–188. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38553-7_10
Apple: iBeacon. https://developer.apple.com/ibeacon/
IP location finder. https://www.iplocation.net
IP address location lookup. http://www.ipfingerprints.com
Kuusniemi, H., Lohan, E.S., Järvinen, K., et al.: Information security of location estimation increasing trustworthiness. ESA NAVITEC 2016. https://www.researchgate.net/publication/313288754_INFORMATION_SECURITY_OF_LOCATION_ESTIMATION_-_INCREASING_TRUSTWORTHINESS
Meltdown and Spectre -Vulnerabilities in modern computers leak passwords and sensitive data. https://meltdownattack.com
Skyhook. http://www.skyhookwireless.com/
Tanaka, H., Wang, L., Ichikawa, R., Iwama, T., Koyama, Y.: Position authentication using homomorphic encryption. IEICE Trans. Inf. Syst. 96(8), 1913–1924 (2013)
Vincenty, T.: Direct and inverse solutions of geodesics on the ellipsoid with application of nested equations. Surv. Rev. 23(176), 88–93 (1975)
Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. In: 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011). https://www.usenix.org/legacy/events/nsdi11/tech/full_papers/Wang_Yong.pdf
World Geodetic System 1984 (WGS 84). https://cddis.nasa.gov/926/egm96/doc/S11.HTML
Acknowldgement
This work was supported by JSPS KAKENHI Grant Number 17K06455.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tanaka, H., Fukushima, K. (2020). Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. In: Kanhere, S., Patil, V.T., Sural, S., Gaur, M.S. (eds) Information Systems Security. ICISS 2020. Lecture Notes in Computer Science(), vol 12553. Springer, Cham. https://doi.org/10.1007/978-3-030-65610-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-65610-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65609-6
Online ISBN: 978-3-030-65610-2
eBook Packages: Computer ScienceComputer Science (R0)