Abstract
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols satisfying the SDM property, a malicious device can lie about its distance from the verifiers, but all distances can only be altered by the same amount. We demonstrate that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device. We also present several lightweight localization protocols that satisfy the SDM property.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)
Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low cost outdoor localization for very small devices. Technical Report 00-729, Computer Science Department, University of Southern California (April 2000)
Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2) (2000)
Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: INFOCOM (2006)
Čapkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM (2005)
Clulow, J., Hancke, G., Kuhn, M., Moore, T.: So near and yet so far: distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)
Du, W., Fang, L., Ning, P.: LAD: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7), 874–886 (2006)
Fontana, R., Richley, E., Barney, J.: Commercialization of an ultra wideband precision asset location system. In: IEEE Conf. on Ultra Wideband Systems and Technologies (2003)
He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: MOBICOM (2003)
Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: SecureComm (2005)
Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, Heidelberg (1997)
Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: IPSN (2005)
Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: ICDCS (2005)
LORAN. LORAN-C general information (2006), http://www.navcen.uscg.gov/loran/
Lazos, L., Poovendran, R.: SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sensor Networks 1(1), 73–100 (2005)
Lazos, L., Poovendran, R., Čapkun, S.: ROPE: Robust position estimation in wireless sensor networks. In: IPSN (2005)
Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: SecureComm (2006)
Niculescu, D., Nath, B.: Ad hoc positioning system (APS) using AoA. In: INFOCOM (2003)
Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. J. Telecommunication Systems (2003)
Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: MOBICOM (2000)
Rappaport, T.: Wireless Communications: Principle and Practice. Prentice-Hall, Englewood Cliffs (1996)
Savvides, A., Han, C.-C., Srivastava, M.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Mobile Computing and Networking, pp. 166–179 (2001)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: WiSe (2003)
Waters, B., Felten, E.: Secure, private proofs of location. Technical Report 667-03, Department of Computer Science, Princeton University (January 2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shmatikov, V., Wang, MH. (2007). Secure Verification of Location Claims with Simultaneous Distance Modification. In: Cervesato, I. (eds) Advances in Computer Science – ASIAN 2007. Computer and Network Security. ASIAN 2007. Lecture Notes in Computer Science, vol 4846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76929-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-76929-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76927-9
Online ISBN: 978-3-540-76929-3
eBook Packages: Computer ScienceComputer Science (R0)