Skip to main content

2020 | OriginalPaper | Buchkapitel

Secure Location Verification: Why You Want Your Verifiers to Be Mobile

verfasst von : Matthias Schäfer, Carolina Nogueira, Jens B. Schmitt, Vincent Lenders

Erschienen in: Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The integrity of location information is crucial in many applications such as access control or environmental sensing. Although there are several solutions to the problem of secure location verification, they all come with expensive requirements such as tight time synchronization, cooperative verification protocols, or dedicated hardware. Yet, meeting these requirements in practice is often not feasible which renders the existing solutions unusable in many scenarios. We therefore propose a new solution which exploits the mobility of verifiers to verify locations. We show that mobility can help minimize system requirements while at the same time achieves strong security. Specifically, we show that two moving verifiers are sufficient to securely verify location claims of a static prover without the need for time synchronization, active protocols, or otherwise specialized hardware. We provide formal proof that our method is secure with minimal effort if the verifiers are able to adjust their movement to the claimed location (“controlled mobility”). For scenarios in which controlled mobility is not feasible, we evaluate how more general claim-independent movement patterns of verifiers affect the security of our system. Based on extensive simulations, we propose simple movement strategies which improve the attack detection rate up to 290% with only little additional effort compared to random (uncontrolled) movements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
As for verifiers and prover, we use https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-42048-2_27/MediaObjects/496043_1_En_27_Figi_HTML.gif interchangeably for the adversary’s identity and location whenever the meaning is clear from the context.
 
2
We interpret propagation delays as direct representatives of distances.
 
Literatur
1.
Zurück zum Zitat Baker, R., Martinovic, I.: Secure location verification with a mobile receiver. In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC), October 2016 Baker, R., Martinovic, I.: Secure location verification with a mobile receiver. In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC), October 2016
3.
Zurück zum Zitat Chiang, J.T., Haas, J.J., Choi, J., Hu, Y.C.: Secure location verification using simultaneous multilateration. IEEE Trans. Wirel. Commun. 11(2), 584–591 (2012)CrossRef Chiang, J.T., Haas, J.J., Choi, J., Hu, Y.C.: Secure location verification using simultaneous multilateration. IEEE Trans. Wirel. Commun. 11(2), 584–591 (2012)CrossRef
4.
Zurück zum Zitat Chiang, J.T., Haas, J.J., Hu, Y.C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec), March 2009 Chiang, J.T., Haas, J.J., Hu, Y.C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec), March 2009
6.
Zurück zum Zitat Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), February 2004 Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), February 2004
7.
Zurück zum Zitat International Civil Aviation Organization (ICAO): International Standards and Recommended Practices, Annex 10: Aeronautical Telecommunications, 6 edn. Volume I: Radio Navigation Aids (2006) International Civil Aviation Organization (ICAO): International Standards and Recommended Practices, Annex 10: Aeronautical Telecommunications, 6 edn. Volume I: Radio Navigation Aids (2006)
8.
Zurück zum Zitat Lazos, L., Poovendran, R., Čapkun, S.: ROPE: robust position estimation in wireless sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN). IEEE Press, April 2005 Lazos, L., Poovendran, R., Čapkun, S.: ROPE: robust position estimation in wireless sensor networks. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN). IEEE Press, April 2005
10.
Zurück zum Zitat Perazzo, P., Ariyapala, K., Conti, M., Dini, G.: The verifier bee: a path planner for drone-based secure location verification. In: Proceedings of the 16th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2015 Perazzo, P., Ariyapala, K., Conti, M., Dini, G.: The verifier bee: a path planner for drone-based secure location verification. In: Proceedings of the 16th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2015
11.
Zurück zum Zitat Rasmussen, K.B., Čapkun, S.: Realization of RF distance bounding. In: Proceedings of the 19th USENIX Conference on Security (2010) Rasmussen, K.B., Čapkun, S.: Realization of RF distance bounding. In: Proceedings of the 19th USENIX Conference on Security (2010)
12.
Zurück zum Zitat Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security (WiSe), September 2003 Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security (WiSe), September 2003
13.
Zurück zum Zitat Schäfer, M., Lenders, V., Schmitt, J.B.: Secure track verification. In: IEEE Symposium on Security and Privacy, May 2015 Schäfer, M., Lenders, V., Schmitt, J.B.: Secure track verification. In: IEEE Symposium on Security and Privacy, May 2015
14.
Zurück zum Zitat Schäfer, M., Leu, P., Lenders, V., Schmitt, J.: Secure motion verification using the doppler effect. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2016 Schäfer, M., Leu, P., Lenders, V., Schmitt, J.: Secure motion verification using the doppler effect. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), July 2016
15.
Zurück zum Zitat Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS), November 2005 Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS), November 2005
16.
Zurück zum Zitat Strohmeier, M., Lenders, V., Martinovic, I.: Lightweight location verification in air traffic surveillance networks. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (CPSS) (2015) Strohmeier, M., Lenders, V., Martinovic, I.: Lightweight location verification in air traffic surveillance networks. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (CPSS) (2015)
17.
Zurück zum Zitat Strohmeier, M., Schäfer, M., Pinheiro, R., Lenders, V., Martinovic, I.: On perception and reality in wireless air traffic communication security. IEEE Trans. Intell. Transp. Syst. 18(6), 1338–1357 (2017) Strohmeier, M., Schäfer, M., Pinheiro, R., Lenders, V., Martinovic, I.: On perception and reality in wireless air traffic communication security. IEEE Trans. Intell. Transp. Syst. 18(6), 1338–1357 (2017)
18.
Zurück zum Zitat Tippenhauer, N.O., Pöpper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), October 2011 Tippenhauer, N.O., Pöpper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), October 2011
19.
Zurück zum Zitat Čapkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report, École polytechnique fédérale de Lausanne (EPFL) (2004) Čapkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report, École polytechnique fédérale de Lausanne (EPFL) (2004)
20.
Zurück zum Zitat Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 3, March 2005 Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 3, March 2005
21.
Zurück zum Zitat Čapkun, S., Rasmussen, K.B., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)CrossRef Čapkun, S., Rasmussen, K.B., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)CrossRef
22.
Zurück zum Zitat Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), April 2006 Čapkun, S., Čagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), April 2006
Metadaten
Titel
Secure Location Verification: Why You Want Your Verifiers to Be Mobile
verfasst von
Matthias Schäfer
Carolina Nogueira
Jens B. Schmitt
Vincent Lenders
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42048-2_27