skip to main content
10.1145/1287853.1287892acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

SecNav: secure broadcast localization and time synchronization in wireless networks

Published: 09 September 2007 Publication History

Abstract

We propose SecNav, a new protocol for securing wireless navigation systems. This protocol secures localization and time synchronization in wireless networks by relying on devices' awareness of presence in the power-range (coverage area) of navigation stations. We perform a detailed security analysis of SecNav and show that, compared to existing secure navigation approaches, it prevents the widest range of attacks on navigation. Our implementation of SecNav, using 802.11b devices, shows that this scheme can be efficiently implemented with existing technologies.

References

[1]
M. G. Kuhn. An Asymmetric Security Mechanism for Navigation Signals. In Proceedings of the Information Hiding Workshop, 2004.
[2]
L. Lazos and R. Poovendran. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2004.
[3]
L. Lazos, S. Capkun, and R. Poovendran. ROPE: Robust Position Estimation in Wireless Sensor Networks. In Proceedings of IPSN, 2005.
[4]
M. Cagalj, S. Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, M. Srivastava, and Jean-Pierre Hubaux. Integrity (I) codes: Message Integrity Protection and Authentication Over Insecure Channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, 2006.
[5]
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2005.
[6]
S. Capkun, K. Rasmussen, and M. Cagalj. SecNav: Secure broadcast localization and time synchronization in wireless networks. Technical Report 546, ETH Zurich, 2007.
[7]
S. Capkun, M. Cagalj, and M. Srivastava. Secure Localization withHidden and Mobile Base Stations. In Proceedings of the IEEEConference on Computer Communications (InfoCom), 2006.

Cited By

View all
  • (2024)Fast Neighbor Discovery for Wireless Ad Hoc Network With Successive Interference CancellationIEEE Transactions on Vehicular Technology10.1109/TVT.2023.331037773:1(1322-1336)Online publication date: Jan-2024
  • (2021)Spectrum-flexible secure broadcast rangingProceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3448300.3467819(300-310)Online publication date: 28-Jun-2021
  • (2021)Cognitive Neighbor Discovery With Directional Antennas in Self-Organizing IoT NetworksIEEE Internet of Things Journal10.1109/JIOT.2020.30370678:8(6865-6877)Online publication date: 15-Apr-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking
September 2007
370 pages
ISBN:9781595936813
DOI:10.1145/1287853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. secure localization
  2. secure time synchronization

Qualifiers

  • Article

Conference

MobiCom/MobiHoc '07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Fast Neighbor Discovery for Wireless Ad Hoc Network With Successive Interference CancellationIEEE Transactions on Vehicular Technology10.1109/TVT.2023.331037773:1(1322-1336)Online publication date: Jan-2024
  • (2021)Spectrum-flexible secure broadcast rangingProceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3448300.3467819(300-310)Online publication date: 28-Jun-2021
  • (2021)Cognitive Neighbor Discovery With Directional Antennas in Self-Organizing IoT NetworksIEEE Internet of Things Journal10.1109/JIOT.2020.30370678:8(6865-6877)Online publication date: 15-Apr-2021
  • (2020)Localization Schemes and Its Challenges in Underwater Wireless Sensor NetworksJournal of Computational and Theoretical Nanoscience10.1166/jctn.2020.911617:6(2750-2754)Online publication date: 1-Jun-2020
  • (2020)Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00010(500-516)Online publication date: May-2020
  • (2019)Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy LogicMobile Networks and Applications10.1007/s11036-018-1192-yOnline publication date: 23-Jan-2019
  • (2017)Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2017.27535794:6(2199-2206)Online publication date: Dec-2017
  • (2016)Secure Node Localization in Clustered Sensor Networks with Effective Key RevocationEmerging Innovations in Wireless Networks and Broadband Technologies10.4018/978-1-4666-9941-0.ch002(12-41)Online publication date: 2016
  • (2016)Secure Localisation of Wireless Devices with Application to Sensor Networks using SteganographyProcedia Computer Science10.1016/j.procs.2016.02.10778:C(610-616)Online publication date: 1-Mar-2016
  • (2016)Towards Solutions for Current Security Related Issues in ETSI ITSProceedings of the 10th International Workshop on Communication Technologies for Vehicles - Volume 966910.1007/978-3-319-38921-9_15(136-148)Online publication date: 6-Jun-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media