Download presentation
Presentation is loading. Please wait.
Published byMaryann Mason Modified over 9 years ago
1
Location Measurements Martin Thomson, IETF-77 draft-thomson-geopriv-held-measurements Location Generator Location Server Device Target Location Recipient Rule Maker 1
2
Geopriv/Internet Location Options for positioning are limited in the current architecture ◦ HELD, DHCP provide purely network-based positioning Wiremap tracing Network based timing ◦ Device-based positioning is purely autonomous GPS User-provided location 2
3
Co-operative Positioning Location Generator Device Access Network The LG can retrieve information from the network The LG has knowledge of the network topology The Device can take measurements 3 Cooperation between LIS/LG and Device enables more positioning options: A-GPS, radio timing (RTT, TDOA), radio camera
4
Security Problems Using measurements to: A.gain someone else’s location B.extract information about network topology C.indirectly spoof location 4
5
Problem A: Get Someone Else’s Location Attacker somehow gets measurements for a victim The LIS authorizes a request based on identity The LIS does not check that the measurement is valid and produces the victim’s location Limitations: in most cases, it’s quite hard to get measurements for someone else ◦ This is easy only if you know the victim’s location ◦ Additional measures might be necessary for some cases e.g. LLDP exposes information that might be used 5
6
Problem B: Network Topology Mapping Based on the previous method By repeatedly guessing measurements an attacker might acquire a map of the network ◦ Matching measurements to locations ◦ Determining network coverage and other potentially sensitive information Limited by the same mechanisms Place a rate limit on requests from clients 6
7
Problem C: Lying by Proxy It’s one thing to lie about your location It’s another thing entirely to get someone else to do your lying for you Measurements can be spoofed to coerce a LIS/LG to provide a falsified location ◦ Any credibility granted to the LIS/LG above that of the Device is thereby gained ◦ It’s straightforward to spoof measurements 7
8
Option 1: “We don’t need no water…” Existing location systems are trivially spoofed…and no one seems to care Location information is largely produced for ultimate use by Targets (navigation, etc…) ◦ There is no gain in spoofing for these applications These systems aren’t a fair comparison ◦ A number of factors limit the feasibility of spoofing in existing systems ◦ Locked hardware, difficulty of implementation, advanced knowledge, limited and controlled device deployments The Internet community is resourceful enough to overcome these inconveniences 8
9
Option 2: Check your inputs Measurements can be checked ◦ Just as we have mandated for identifiers Works for A, B, and C Doesn’t work for all types of measurements ◦ A network-based location service cannot check every type of measurement ◦ Would invalidate many methods ◦ …and severely constrain others 9
10
Option 3: Sanity check outputs Compare the result of using measurements with an independently obtained location It’s only possible to get a more accurate result if you can tolerate some uncertainty Limits scope of attacks, doesn’t prevent them LG determined location Bad: outside uncertainty Probably ok 10
11
Option 4: Assign blame Make it clear when location information is based on information that wasn’t checked ◦ Create new labels for PIDF-LO that identify the nature of the source (LIS/Device/Other) ◦ Could be used to address shortcomings of the previous option Could also include verified data that is appropriately labelled Decisions on trust are handled by recipients ◦ Recipients exercise option 1 at their discretion ◦ More accurate location is available 11
12
Actions draft-thomson-geopriv-held-measurements ◦ Describes one protocol mechanism for exchanging measurements ◦ A framework for providing measurements Aside from the problem presented today ◦ The set of measurements and the protocol interactions need definition ◦ Is this work headed in the right direction? Location Generator Device 12
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.