Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/941311.941313acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Secure verification of location claims

Published: 19 September 2003 Publication History

Abstract

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.

References

[1]
GPS Documentation. https://www.peterson.af.mil/GPS_Support/gps_documentation.htm.]]
[2]
Paramvir Bahl and Venkata~N. Padmanabhan. RADAR: An In-Building RF-Based User Location and Tracking System. In INFOCOM (2), pages 775--784, 2000.]]
[3]
Dirk Balfanz, D.K. Smetters, Paul Stewart, and H. Chi Wong. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Network and Distributed System Security Symposium Conference Proceedings, 2002.]]
[4]
Stefan Brands and David Chaum. Distance-Bounding Protocols. In EUROCRYPT '93, volume 765 of LNCS.]]
[5]
Deborah Caswell and Philippe Debaty. Creating Web Representations for Places. In 2nd International Symposium on Handheld and Ubiquitous Computing, pages 114--126, 2000.]]
[6]
Mark D. Corner and Brian D. Noble. Zero-Interaction Authentication. In MOBICOM '02. ACM Press, 2002.]]
[7]
Dorothy E. Denning and Peter F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. In Computer Fraud & Security. Elsevier Science Ltd., February 1996.]]
[8]
Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-Grained Network Time Synchronization using Reference Broadcasts. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), 2002.]]
[9]
Eran Gabber and Avishai Wool. How to Prove Where You Are: Tracking the Location of Customer Equipment. In Proceedings of the 5th ACM conference on Computer and Communications Security, pages 142--149, 1998.]]
[10]
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, and Deborah Estrin. Locating Tiny Sensors in Time and Space: A Case Study. In ICCD, 2002.]]
[11]
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for network sensors. In ASPLOS, 2002.]]
[12]
Yih-Chun Hu, Adrian Perrig, and David~B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In INFOCOM, 2003.]]
[13]
Tim Kindberg, Kan Zhang, and Narendar Shankar. Context Authentication Using Constrained Channels. In Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.]]
[14]
A.M. Ladd, K.E. Bekris, G. Marceau, A. Rudys, D.S. Wallach, and L.E. Kavraki. Robotics-Based Location Sensing for Wireless Ethernet. In Eigth Annual International Conference on Mobile Computing and Networks (MobiCOM 2002), 2002.]]
[15]
Nissanka B. Priyantha, Allen K. L. Miu, Hari Balakrishnan, and Seth J. Teller. The cricket compass for context-aware mobile applications. In Mobile Computing and Networking, pages 1--14, 2001.]]
[16]
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172--92, 1999.]]
[17]
John A. Volpe. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, August 2001.]]
[18]
A. Ward, A. Jones, and A. Hopper. A New Location Technique for the Active Office. IEEE Personal Communications, 4(5):42--47, October 1997.]]
[19]
Brent Waters and Ed~Felten. Proving the Location of Tamper Resistent Devices. http://www.cs.princeton.edu/~bwaters/research/location_proving.ps.]]

Cited By

View all
  • (2024)A multi-dimensional framework for improving data reliability in mobile crowd sensingEgyptian Informatics Journal10.1016/j.eij.2024.10051827(100518)Online publication date: Sep-2024
  • (2024)Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA SchemeWireless Artificial Intelligent Computing Systems and Applications10.1007/978-3-031-71470-2_12(139-150)Online publication date: 13-Nov-2024
  • (2023)A multipath routing protocol for secure energy efficient communication in Wireless Sensor NetworksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109842232:COnline publication date: 1-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security
September 2003
106 pages
ISBN:1581137699
DOI:10.1145/941311
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. secure location authentication
  2. secure location verification
  3. sensor networks

Qualifiers

  • Article

Conference

WiSE03
Sponsor:

Acceptance Rates

WiSe '03 Paper Acceptance Rate 10 of 41 submissions, 24%;
Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)4
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A multi-dimensional framework for improving data reliability in mobile crowd sensingEgyptian Informatics Journal10.1016/j.eij.2024.10051827(100518)Online publication date: Sep-2024
  • (2024)Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA SchemeWireless Artificial Intelligent Computing Systems and Applications10.1007/978-3-031-71470-2_12(139-150)Online publication date: 13-Nov-2024
  • (2023)A multipath routing protocol for secure energy efficient communication in Wireless Sensor NetworksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109842232:COnline publication date: 1-Aug-2023
  • (2022)Location-Based Schemes for Mitigating Cyber Threats on Connected and Automated Vehicles: A Survey and Design FrameworkIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2020.303875523:4(2919-2937)Online publication date: Apr-2022
  • (2022)Incentivizing WiFi-Based Multilateration Location VerificationIEEE Internet of Things Journal10.1109/JIOT.2021.30968209:4(3083-3096)Online publication date: 15-Feb-2022
  • (2022)ML-AWARE: A Machine Learning Approach for Detecting Wormhole Attack Resonance2022 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS56114.2022.10092921(1-6)Online publication date: 3-Oct-2022
  • (2021)LocaRDS: A Localization Reference Data SetSensors10.3390/s2116551621:16(5516)Online publication date: 17-Aug-2021
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • (2021)HashWires: Hyperefficient Credential-Based Range ProofsProceedings on Privacy Enhancing Technologies10.2478/popets-2021-00612021:4(76-95)Online publication date: 23-Jul-2021
  • (2021)WAND: Wormhole Attack Analysis using the Neighbor Discovery for Software-defined Heterogeneous Internet of Things2021 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops50388.2021.9473770(1-6)Online publication date: Jun-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media