Secure Location Verification with a Mobile Receiver

被引:12
|
作者
Baker, Richard [1 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Oxford OX1 2JD, England
来源
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY | 2016年
关键词
D O I
10.1145/2994487.2994497
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a technique for performing secure location verification of position claims by measuring the time-difference of arrival (TDoA) between a fixed receiver node and a mobile one. The mobile node moves randomly in order to substantially increase the difficulty for an attacker to make false messages appear genuine. We explore the performance and requirements of such a system in the context of verifying aircraft position claims made over the Automatic Dependent Surveillance - Broadcast (ADS-B) system through the use of simulation and find that it correctly detects false claims with a peak accuracy of over 97% for the most complex attack modelled; requiring only 75m of deviation between the reported position and the actual position in order for a false claim to be detected. We then report on our design for a mobile receiver and our construction of a prototype using low-cost COTS equipment. We discuss some additional bene fits of incorporating a mobile node, examine the difficulties to be overcome and explore the applicability of the approach in other location verification use-cases.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [31] Research on Robust Timing Receiver with Joint Verification of Location and Clock Offset
    Shen, Dan
    Gong, Hang
    Liu, Zengjun
    Zhu, Xiangwei
    Wang, Feixue
    CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2018 PROCEEDINGS, VOL I, 2018, 497 : 581 - 592
  • [32] Single-receiver mobile location in WCDMA cellular networks
    Wang, L
    Liu, ZJ
    Hu, HY
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 4, 2005, : 1 - 5
  • [33] A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
    Thammarat, Chalee
    Techapanupreeda, Chian
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 249 - 254
  • [34] Secure mobile payment framework based on UICC with formal verification
    Ahamad, Shaik Shakeel
    Sastry, V. N.
    Udgata, Siba K.
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 355 - 370
  • [35] Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol
    Graham, Michelle
    Gray, David
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 160 - 171
  • [36] A STATISTICAL APPROACH TOWARDS SECURE LOCATION VERIFICATION IN NOISY WIRELESS CHANNELS
    Mandal, Partha Sarathi
    Ghosh, Anil K.
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2014, 25 (05) : 563 - 584
  • [37] Shooting to the Stars: Secure Location Verification via Meteor Burst Communications
    Sciancalepore, Savio
    Oligeri, Gabriele
    Di Pietro, Roberto
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [38] Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways
    Tithi, Tasnuva
    Deka, Bhaswati
    Gerdes, Ryan M.
    Winstead, Chris
    Li, Ming
    Heaslip, Kevin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) : 7437 - 7449
  • [39] A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET
    Abumansoor, Osama
    Boukerche, Azzedine
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) : 275 - 285
  • [40] Secure probabilistic location verification in randomly deployed wireless sensor networks
    Ekici, E.
    Vural, S.
    McNair, J.
    Al-Abri, D.
    AD HOC NETWORKS, 2008, 6 (02) : 195 - 209