Skip to main content

Secure Verification of Location Claims with Simultaneous Distance Modification

  • Conference paper
Advances in Computer Science – ASIAN 2007. Computer and Network Security (ASIAN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4846))

Included in the following conference series:

Abstract

We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols satisfying the SDM property, a malicious device can lie about its distance from the verifiers, but all distances can only be altered by the same amount. We demonstrate that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device. We also present several lightweight localization protocols that satisfy the SDM property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)

    Google Scholar 

  2. Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low cost outdoor localization for very small devices. Technical Report 00-729, Computer Science Department, University of Southern California (April 2000)

    Google Scholar 

  3. Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2) (2000)

    Google Scholar 

  4. Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: INFOCOM (2006)

    Google Scholar 

  5. Čapkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM (2005)

    Google Scholar 

  6. Clulow, J., Hancke, G., Kuhn, M., Moore, T.: So near and yet so far: distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Du, W., Fang, L., Ning, P.: LAD: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7), 874–886 (2006)

    Article  MATH  Google Scholar 

  8. Fontana, R., Richley, E., Barney, J.: Commercialization of an ultra wideband precision asset location system. In: IEEE Conf. on Ultra Wideband Systems and Technologies (2003)

    Google Scholar 

  9. He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: MOBICOM (2003)

    Google Scholar 

  10. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: SecureComm (2005)

    Google Scholar 

  11. Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, Heidelberg (1997)

    Google Scholar 

  12. Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: IPSN (2005)

    Google Scholar 

  13. Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: ICDCS (2005)

    Google Scholar 

  14. LORAN. LORAN-C general information (2006), http://www.navcen.uscg.gov/loran/

  15. Lazos, L., Poovendran, R.: SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sensor Networks 1(1), 73–100 (2005)

    Article  Google Scholar 

  16. Lazos, L., Poovendran, R., Čapkun, S.: ROPE: Robust position estimation in wireless sensor networks. In: IPSN (2005)

    Google Scholar 

  17. Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: SecureComm (2006)

    Google Scholar 

  18. Niculescu, D., Nath, B.: Ad hoc positioning system (APS) using AoA. In: INFOCOM (2003)

    Google Scholar 

  19. Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. J. Telecommunication Systems (2003)

    Google Scholar 

  20. Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: MOBICOM (2000)

    Google Scholar 

  21. Rappaport, T.: Wireless Communications: Principle and Practice. Prentice-Hall, Englewood Cliffs (1996)

    Google Scholar 

  22. Savvides, A., Han, C.-C., Srivastava, M.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Mobile Computing and Networking, pp. 166–179 (2001)

    Google Scholar 

  23. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: WiSe (2003)

    Google Scholar 

  24. Waters, B., Felten, E.: Secure, private proofs of location. Technical Report 667-03, Department of Computer Science, Princeton University (January 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Iliano Cervesato

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shmatikov, V., Wang, MH. (2007). Secure Verification of Location Claims with Simultaneous Distance Modification. In: Cervesato, I. (eds) Advances in Computer Science – ASIAN 2007. Computer and Network Security. ASIAN 2007. Lecture Notes in Computer Science, vol 4846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76929-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76929-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76927-9

  • Online ISBN: 978-3-540-76929-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics