Eliminating rouge femtocells based on distance bounding protocol and geographic information

被引:12
作者
Chen, Chien-Ming [1 ]
Chen, Yao-Hsin [2 ]
Lin, Yue-Hsun [3 ]
Sun, Hung-Min [4 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Innovat Informat Ind Res Ctr, Shenzhen, Peoples R China
[2] ITRI, Informat & Commun Res Labs, Hsinchu, Taiwan
[3] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
[4] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30043, Taiwan
关键词
Femtocell; CSG; Location authentication; Wormhole attack; Sinkhole attack; SECURE; REQUIREMENTS; CHALLENGES;
D O I
10.1016/j.eswa.2013.07.068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, femtocell solutions have been attracting increasing attention since coverage for broadband radios can effectively eliminate wireless notspots. To restrict malicious subscribers from accessing femtocells, 3G/WiMAX standards introduce an access control strategy, called Closed Subscriber Group (CSG). However, CSG only prevents malicious clients, but not rouge femtocells. In 2009, Han et al. proposed the first mutual authentication mechanism. This mechanism does not consider the case that an attacker can locate femtocells in an unregistered area even these femtocells are legitimate. In this paper, we first define two attacks, sinkhole and wormhole attacks, in femtocell-enabled mobile networks. Then, we design two approaches based on distance bounding protocols and geographic information to defend against these two attacks. In our design, a subscriber can confirm whether or not the femtocell he connected with is physically-present. Experiment results demonstrate that the distance bounding protocol can estimate an approximate distance between a subscriber's device and the deployed femtocell. Moreover, femtocells that are deployed inside or outside can both be identified and distinguished without the bias of signal strength based on our design. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:426 / 433
页数:8
相关论文
共 33 条
[1]  
3GPP, 2008, TR 25 820 V8 2 0 3G
[2]  
3GPP, 2010, TS 33 102 V9 2 0 3G
[3]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[4]  
[Anonymous], WORKSH RFID SEC RFID
[5]  
Bilogrevic I., 2010, 2 INT FEMT WORKSH CI
[6]  
Black D.L., 2008, TECHNICAL REPORT
[7]  
Borgaonkar Ravishankar, 2012, Information Security Technology for Applications.15th Nordic Conference on Secure IT Systems, NordSec 2010. Revised Selected Papers, P49, DOI 10.1007/978-3-642-27937-9_4
[8]  
Borgaonkar R, 2011, P 4 INT C SEC INF NE, P95
[9]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[10]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232