Secure Location Verification with a Mobile Receiver

被引:12
|
作者
Baker, Richard [1 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Oxford OX1 2JD, England
来源
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY | 2016年
关键词
D O I
10.1145/2994487.2994497
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a technique for performing secure location verification of position claims by measuring the time-difference of arrival (TDoA) between a fixed receiver node and a mobile one. The mobile node moves randomly in order to substantially increase the difficulty for an attacker to make false messages appear genuine. We explore the performance and requirements of such a system in the context of verifying aircraft position claims made over the Automatic Dependent Surveillance - Broadcast (ADS-B) system through the use of simulation and find that it correctly detects false claims with a peak accuracy of over 97% for the most complex attack modelled; requiring only 75m of deviation between the reported position and the actual position in order for a false claim to be detected. We then report on our design for a mobile receiver and our construction of a prototype using low-cost COTS equipment. We discuss some additional bene fits of incorporating a mobile node, examine the difficulties to be overcome and explore the applicability of the approach in other location verification use-cases.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [1] Secure location verification with hidden and mobile base stations
    Capkun, Srdjan
    Rasmussen, Kasper Bonne
    Cagalj, Mario
    Srivastava, Mani
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (04) : 470 - 483
  • [2] Secure Location Verification: Why You Want Your Verifiers to Be Mobile
    Schafer, Matthias
    Nogueira, Carolina
    Schmitt, Jens B.
    Lenders, Vincent
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 419 - 437
  • [3] Blockchain for secure location verification
    Nosouhi, Mohammad Reza
    Yu, Shui
    Zhou, Wanlei
    Grobler, Marthie
    Keshtiar, Habiba
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 136 : 40 - 51
  • [4] POSTER: Privacy Enhanced Secure Location Verification
    Akand, Md Mamunur Rashid
    Safavi-Naini, Reihaneh
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1793 - 1795
  • [5] Secure Location Verification Using Simultaneous Multilateration
    Chiang, Jerry T.
    Haas, Jason J.
    Choi, Jihyuk
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) : 584 - 591
  • [6] A Secure Framework for Location Verification in Pervasive Computing
    Liu, Dawei
    Lee, Moon-Chuen
    Wu, Dan
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 388 - 397
  • [7] Secure location verification using radio broadcast
    Vora, A
    Nesterenko, M
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 369 - 383
  • [8] Secure localization and location verification in sensor networks
    Lee, YH
    Phadke, V
    Lee, JW
    Deshmukh, A
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 278 - 287
  • [9] Secure location verification using radio broadcast
    Vora, Adnan
    Nesterenko, Mikhail
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 377 - 385
  • [10] Formal Verification of a Secure Mobile Banking Protocol
    Huy Hoang Ngo
    Dandash, Osama
    Phu Dung Le
    Srinivasan, Bala
    Wilson, Campbell
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421