Secure and precise location verification using distance bounding and simultaneous multilateration

Jerry T. Chiang, Jason J. Haas, Yin Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Due to the widespread adoption of the Global Positioning System (GPS), many systems have been designed to use the location information of participants. When these systems confer rights (such as access rights) based on location, such claim must be securely verified in order to prevent attackers from gaining access to resources that should be restricted. Substantial effort has been made on secure location verification; however, previous work does not address the impact of collusion attacks where adversaries share their private keys nor do they address a possible jamming attack where attackers inject a high amount of noise to prevent successful challenge and response receptions. In this paper, we propose a secure multilateration scheme that provides maximal security achievable by any time-of-flight based system that does not employ other verification methods.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
Pages181-191
Number of pages11
DOIs
StatePublished - 2009
Event2nd ACM Conference on Wireless Network Security, WiSec'09 - Zurich, Switzerland
Duration: Mar 16 2009Mar 18 2009

Publication series

NameProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09

Other

Other2nd ACM Conference on Wireless Network Security, WiSec'09
Country/TerritorySwitzerland
CityZurich
Period3/16/093/18/09

Keywords

  • Distance bounding
  • Location verification
  • Multilateration

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Secure and precise location verification using distance bounding and simultaneous multilateration'. Together they form a unique fingerprint.

Cite this