This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure Location Verification Using Radio Broadcast
October-December 2006 (vol. 3 no. 4)
pp. 377-385
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the difference between propagation speeds of radio and sound waves to estimate the position of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted by the prover and the distributed topology of the network. The idea is to separate the functions of the sensors. Some sensors are placed such that they receive the signal from the prover if it is inside the protected area. The others are positioned so that they can only receive the signal from the prover outside the area. Hence, the latter sensors reject the prover if they hear its signal. Our solution is versatile and it deals with provers using either omni-directional or directional propagation of radio signals without requiring any special hardware besides a radio transceiver. We estimate the bounds on the number of sensors required to protect the areas of various shapes and extend our solution to handle complex radio signal propagation, optimize sensor placement, and operate without precise topology information.

[1] V. Naik, A. Arora, S. Bapat, and M. Gouda, “Dependable Systems: Whisper: Local Secret Maintenance in Sensor Networks,” IEEE Distributed Systems Online, vol. 4, 2003.
[2] T. Kindberg, K. Zhang, and N. Shankar, “Context Authentication Using Constrained Channels,” Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA), pp. 14-21, 2002.
[3] N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” Proc. ACM Workshop Wireless Security, pp. 1-10, 2003.
[4] D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,” Proc. Symp. Network and Distributed Systems Security (NDSS '02), 2002.
[5] D.E. Denning and P.F. MacDoran, “Location-Based Authentication: Grounding Cyberspace for Better Security,” Internet Besieged: Countering Cyberspace Scofflaws, D.E. Denning and P.J. Denning, eds., pp. 167-174, ACM Press/Addison-Wesley, 1998, reprint from Computer Fraud and Security, Elsevier Science, Ltd., Feb. 1996.
[6] Y.C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks,” Proc. INFOCOM, 2003.
[7] S. Brands and D. Chaum, “Distance-Bounding Protocols (Extended Abstract),” Advances in Cryptology—Proc. EUROCRYPT '93, pp. 344-359, 1993.
[8] M.D. Corner and B.D. Noble, “Zero-Interaction Authentication,” Proc. Eighth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom '02), pp. 1-11, 2002.
[9] S. Čapkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., special issue on security in wireless ad hoc networks, to appear.
[10] L. Lazos, R. Poovendran, and S. Čapkun, “Rope: Robust Position Estimation in Wireless Sensor Networks,” Proc. Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 324-331, 2005.
[11] T. Kindberg and K. Zhang, “Validating and Securing Spontaneous Associations between Wireless Devices,” Proc. ISW: Int'l Workshop Information Security, pp. 44-53, 2003.
[12] E. Gabber and A. Wool, “How to Prove where You Are: Tracking the Location of Customer Equipment,” Proc. Fifth ACM Conf. Computer and Comm. Security, pp. 142-149, 1998.
[13] F.P. Preparata and M.I. Shamos, Computational Geometry: An Introduction. Springer-Verlag, 1985.
[14] S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M.B. Srivastava, “On Communication Security in Wireless Ad-Hoc Sensor Networks,” Proc. 11th IEEE Int'l Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139-144, 2002.
[15] Tinysec: Link Layer Encryption for Tiny Devices, http://www.cs.berkeley.edu/~nkstinysec/, 2005.
[16] Tinypk Project, http://www.is.bbn.com/projectslws-nest/, 2005.

Index Terms:
Location verification, wireless sensor networks, security.
Citation:
Adnan Vora, Mikhail Nesterenko, "Secure Location Verification Using Radio Broadcast," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 377-385, Oct.-Dec. 2006, doi:10.1109/TDSC.2006.57
Usage of this product signifies your acceptance of the Terms of Use.