ABSTRACT
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
- GPS Documentation. https://www.peterson.af.mil/GPS_Support/gps_documentation.htm.]]Google Scholar
- Paramvir Bahl and Venkata~N. Padmanabhan. RADAR: An In-Building RF-Based User Location and Tracking System. In INFOCOM (2), pages 775--784, 2000.]]Google Scholar
- Dirk Balfanz, D.K. Smetters, Paul Stewart, and H. Chi Wong. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Network and Distributed System Security Symposium Conference Proceedings, 2002.]]Google Scholar
- Stefan Brands and David Chaum. Distance-Bounding Protocols. In EUROCRYPT '93, volume 765 of LNCS.]] Google ScholarDigital Library
- Deborah Caswell and Philippe Debaty. Creating Web Representations for Places. In 2nd International Symposium on Handheld and Ubiquitous Computing, pages 114--126, 2000.]] Google ScholarDigital Library
- Mark D. Corner and Brian D. Noble. Zero-Interaction Authentication. In MOBICOM '02. ACM Press, 2002.]] Google ScholarDigital Library
- Dorothy E. Denning and Peter F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. In Computer Fraud & Security. Elsevier Science Ltd., February 1996.]]Google Scholar
- Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-Grained Network Time Synchronization using Reference Broadcasts. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), 2002.]] Google ScholarDigital Library
- Eran Gabber and Avishai Wool. How to Prove Where You Are: Tracking the Location of Customer Equipment. In Proceedings of the 5th ACM conference on Computer and Communications Security, pages 142--149, 1998.]] Google ScholarDigital Library
- Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, and Deborah Estrin. Locating Tiny Sensors in Time and Space: A Case Study. In ICCD, 2002.]]Google ScholarCross Ref
- Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for network sensors. In ASPLOS, 2002.]] Google ScholarDigital Library
- Yih-Chun Hu, Adrian Perrig, and David~B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In INFOCOM, 2003.]]Google ScholarCross Ref
- Tim Kindberg, Kan Zhang, and Narendar Shankar. Context Authentication Using Constrained Channels. In Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.]] Google ScholarDigital Library
- A.M. Ladd, K.E. Bekris, G. Marceau, A. Rudys, D.S. Wallach, and L.E. Kavraki. Robotics-Based Location Sensing for Wireless Ethernet. In Eigth Annual International Conference on Mobile Computing and Networks (MobiCOM 2002), 2002.]] Google ScholarDigital Library
- Nissanka B. Priyantha, Allen K. L. Miu, Hari Balakrishnan, and Seth J. Teller. The cricket compass for context-aware mobile applications. In Mobile Computing and Networking, pages 1--14, 2001.]] Google ScholarDigital Library
- Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172--92, 1999.]] Google ScholarDigital Library
- John A. Volpe. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, August 2001.]]Google Scholar
- A. Ward, A. Jones, and A. Hopper. A New Location Technique for the Active Office. IEEE Personal Communications, 4(5):42--47, October 1997.]]Google ScholarCross Ref
- Brent Waters and Ed~Felten. Proving the Location of Tamper Resistent Devices. http://www.cs.princeton.edu/~bwaters/research/location_proving.ps.]]Google Scholar
Index Terms
- Secure verification of location claims
Recommendations
Location verification using bidirectional one-way hash function in wireless sensor networks
Evolving networks of wireless ad hoc sensing nodes have many attractive applications. Localisation, that is to determine where a given node is physically located, is a key enabler for many applications of sensor networks. As sensor networks move closer ...
Provably secure server-aided verification signatures
A server-aided verification signature scheme consists of a digital signature scheme and a server-aided verification protocol. With the server-aided verification protocol, some computational tasks for a signature verification are carried out by a server, ...
A Provably Secure Server-Aided Verification Signature
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesA server-aided verification signature scheme consists of a standard signature scheme and a server-aided verification protocol. Signatures can be verified by executing the server-aided verification protocol with the server, which is generally untrusted. ...
Comments