Secure Location Verification with a Mobile Receiver

被引:12
|
作者
Baker, Richard [1 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Oxford OX1 2JD, England
来源
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY | 2016年
关键词
D O I
10.1145/2994487.2994497
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a technique for performing secure location verification of position claims by measuring the time-difference of arrival (TDoA) between a fixed receiver node and a mobile one. The mobile node moves randomly in order to substantially increase the difficulty for an attacker to make false messages appear genuine. We explore the performance and requirements of such a system in the context of verifying aircraft position claims made over the Automatic Dependent Surveillance - Broadcast (ADS-B) system through the use of simulation and find that it correctly detects false claims with a peak accuracy of over 97% for the most complex attack modelled; requiring only 75m of deviation between the reported position and the actual position in order for a false claim to be detected. We then report on our design for a mobile receiver and our construction of a prototype using low-cost COTS equipment. We discuss some additional bene fits of incorporating a mobile node, examine the difficulties to be overcome and explore the applicability of the approach in other location verification use-cases.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [21] Secure Location Verification for Vehicular Ad-Hoc Networks
    Song, Joo-Han
    Wong, Vincent W. S.
    Leung, Victor C. M.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [22] Secure localization and location verification in wireless sensor networks: a survey
    Yingpei Zeng
    Jiannong Cao
    Jue Hong
    Shigeng Zhang
    Li Xie
    The Journal of Supercomputing, 2013, 64 : 685 - 701
  • [23] A secure location service in mobile ad hoc networks
    Zhou, Z
    Yow, KC
    Nandi, S
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2003, : 274 - 277
  • [24] Secure Location Distribution on Mobile Device For Private Meeting
    Chavan, Amita
    Deshmukh, Smita
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1765 - 1768
  • [25] Secure Location Verification A Security Analysis of GPS Signal Authentication
    Becker, Georg T.
    Lo, Sherman C.
    De Lorenzo, David S.
    Enge, Per K.
    Paar, Christof
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 366 - +
  • [26] PASPORT: A Secure and Private Location Proof Generation and Verification Framework
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Yu, Shui
    Grobler, Marthie
    Zhang, Jingwen
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (02): : 293 - 307
  • [27] Secure Vertical Handoff in Mobile Wireless Network Based on Secure Location Algorithm
    Ji, Jingchan
    JOURNAL OF INTERCONNECTION NETWORKS, 2022, 22 (03)
  • [28] Secure distributed location management scheme for mobile hosts
    Shankaran, R
    Varadharajan, V
    Hitchens, M
    LCN 2001: 26TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2001, : 296 - 305
  • [29] Location Based Secure Communication In Mobile Sensor Network
    Bhandalkar, Madhuri
    Palve, A. B.
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 324 - 327
  • [30] Secure Vertical Handoff in Mobile Wireless Network Based on Secure Location Algorithm
    Ji, Jingchan
    Journal of Interconnection Networks, 2022, 22 (03):