Secure Verification of Location Claims

Slides:



Advertisements
Similar presentations
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Advertisements

Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
Secure Location Verification Using Radio Broadcast Adnan Vora, Mikhail Nesterenko 4/27/04.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Time of arrival(TOA) Prepared By Sushmita Pal Roll No Dept.-CSE,4 th year.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
PPP Configuration.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
Position Based Cryptography Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA.
Sound Lesson 2. Previously… Sound as product of vibrations Longitudinal nature of sound Medium required for transmission of sound Differing speed of sound.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show you your exact position on the Earth anytime, in any.
Security Handshake Pitfalls. Client Server Hello (K)
Created by :- prashant more prashant more. INTRODUCTION Bluetooth is wireless high speed data transfer technology over a short range ( meters).
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
TERMINOLOGY Define: WPAN
Outline What is Wireless LAN Wireless Transmission Types
Jamming for good: a fresh approach to authentic communication in WSNs
Wireless Technologies
Golden Linear Group Key Agreement Protocol
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
The University of Adelaide, School of Computer Science
THE OSI MODEL By: Omari Dasent.
Packet Leashes: Defense Against Wormhole Attacks
Domain 4 – Communication and Network Security
PPP PROTOCOL The First semester
Secure Location Verification and Stabilization
Information and Network Security
The Internet and the World Wide Web
Net 435: Wireless sensor network (WSN)
The TESLA Broadcast Authentication Protocol CS 218 Fall 2017
Location of Mobile Device
Localization with witnesses
You will be given the answer. You must give the correct question.
Proximity-based Access Control for Implantable Medical Devices
Mobile Computing.
SPINS: Security Protocols for Sensor Networks
Information Technology Fundamentals
Data Communication and Networks
Data Communication and Networks
DETERMINISTIC ETHERNET FOR SCALABLE MODULAR AVIONICS
Near field communication (NFC)
SPINS: Security Protocols for Sensor Networks
IEEE MEDIA INDEPENDENT HANDOVER
Indoor Location Estimation Using Multiple Wireless Technologies
Wireless Mesh Networks
Data Communication & Networking
Data Communication and Networks
Position Based Cryptography*
Data Communication and Networks
A schematic overview of localization in wireless sensor networks
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security vs. Sequence Length Considerations]
Data Communication and Networks
Protocols.
IoT Requirements for Networking Protocols Sadoon Azizi Department of Computer Engineering and IT.
Session MAC Address Solves Deadlocks
A Model For Network Security
Protocols.
Presentation transcript:

Secure Verification of Location Claims In the physical world, identity is not the only thing that matters. Physical location of the requester plays an important role in determining access rights. Secure Verification of Location Claims comes natural in the physical world but not in information systems. Location verification enables the Secure Verification of Location Claims. Secure Verification of Location Claims benefits: It is Natural . No need to establish shared secrets in advance. 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Let be a set of Verifiers V, Prover p and Region R. location determination problem : verifier actively seeks prover’s exact location. In-region verification problem : prover claims a location and verifier accepts or rejects it. In-region verification problem is easier to tackle. p claims to be in R and v ∈ V accepts or rejects. .v R .p 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Model Assumptions: No attempt to verify exact location of the prover. Attempt t verify location claims for regions R near V. Verifier and prover communicate using RF (radio frequency at the speed of light ) and sound (ultrasound at the speed of sound). Prover must be able to bound its processing delay (time to digest signal). Prover and verifier know region R a priori. 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Model Protocol Does not require Cryptography Does not require time synchronization Does not require any prover – verifier agreement. Suitable for low-cost sensor networks (low CPU and Memory reqs.). Uses Time-of-Flight to estimate distance. p ---RF--- v : p reports location l v ---RF--- p : v sends nonce N (at light speed c) p --Sound- v : p sends nonce N (at sound speed s) v accepts location claim iff: l ≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Possible Attacks Prover tries to cheat by delaying response. Not good. Will appear to be further away. Prover tries to cheat by starting response transmission early. Not possible. Nonce is randomly generated and must be known before response. p ---RF--- v : p reports location l v ---RF--- p : v sends nonce N (at light speed c) p --Sound- v : p sends nonce N (at sound speed s) v accepts location claim iff: l ≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Processing Delay Prover requires some time (∆p) to process nonce N. Prover is aware of its ∆p and reports it to the verifier. p ---RF--- v : p reports location l and ∆p v ---RF--- p : v sends nonce N (at light speed c) p --Sound- v : p sends nonce N (after ∆p seconds) v accepts location claim iff: l ≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) + ∆p 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Possible Attacks….again. Prover tries to cheat by reporting location l at border of region R and overstating processing delay ∆p. Verifier shrinks allowable region by s.∆p. ROA(v,∆p) : Region Of Acceptance where location claims are permitted by v if the claimed processing delay is ∆p. ROA(v,0) = R .v R .p l ≤ R - s∆p 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Non-uniform Regions ROA must be a circle since signals travel at the same speed in all directions. ROA must be wholly contained in region R so as to not accept a location claim outside of R. ROA should be largest circle that fits within R. ROA(v,0) .p .v ROA(v,∆p) R 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Non-uniform Regions…continue. Let ROA(∆p) region where at least one verifier node can prove location claim. ROA(∆p) = ỤROA(v,∆p) More than one verifier might be eligible. Prover does not gain any advantage by selecting a different verifier. Coverage = ROA(∆p) / R .v R .p ROA(∆p) 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Possible Attacks….once more. “remote actuation” : complice inside R helps remote attacker. Low-delay remote actuation of sonic signals is infeasible. 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Rejected Variants: (radio, sound)  (radio, radio) Error term ∆p.c would be very large (may exceed R and verifier may not accept location claims at all. (radio, sound)  (sound, radio) or (sound, sound) May attack with laser-based “remote bugging” of sound. .v R .p ROA(∆p) 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Protocol Variant: Keyed Echo Protocol All verifiers and a prover share a key, therefore verifier can verify that a particular prover is inside R. p ---RF--- v : p reports location l and ∆p v ---RF--- p : v sends nonce N (at light speed c) p --Sound- v : p sends nonce N (after ∆p seconds) .v R .p ROA(∆p) 1/13/2019 By Alvaro E. Escobar

Secure Verification of Location Claims Future Work: More precise region verification. Location-limited channels : Comm. Mechanism restricted to short range. GPS (Global Positioning System) : Do not address security 1/13/2019 By Alvaro E. Escobar