Secure location verification using simultaneous multilateration

Jerry T. Chiang, Jason J. Haas, Jihyuk Choi, Yih Chun Hu

Research output: Contribution to journalArticle

Abstract

Substantial effort has been invested on secure location verification in hope to enable mobile wireless systems to optimize system performance or securely confer rights based on the participants' locations. However, most previous studies do not address the impact of, and are often susceptible to, collusion attacks in which adversaries share their private keys. In this paper, we propose a secure multilateration scheme. Given the same processing delay, detection threshold, and assuming zero synchronization error between verifiers, our proposed scheme achieves the highest rate of false-location detection by any verification system based solely on time-of-flight measurements. We also show that our scheme is resilient to collusion attacks if the verification system can detect the distance enlargement attack. We propose using other physical measurements to mitigate the distance enlargement, and thus also the collusion, attacks. To the best of our knowledge, this is the first attempt to prevent collusion attacks by mitigating the distance enlargement attack.

Original languageEnglish (US)
Article number6108305
Pages (from-to)584-591
Number of pages8
JournalIEEE Transactions on Wireless Communications
Volume11
Issue number2
DOIs
StatePublished - Feb 1 2012

Fingerprint

Collusion Attack
Enlargement
Attack
Time-of-flight
Synchronization
System Performance
Optimise
Processing
Time difference of arrival
Zero

Keywords

  • Location verification
  • distance bounding
  • multilateration

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Cite this

Secure location verification using simultaneous multilateration. / Chiang, Jerry T.; Haas, Jason J.; Choi, Jihyuk; Hu, Yih Chun.

In: IEEE Transactions on Wireless Communications, Vol. 11, No. 2, 6108305, 01.02.2012, p. 584-591.

Research output: Contribution to journalArticle

Chiang, Jerry T. ; Haas, Jason J. ; Choi, Jihyuk ; Hu, Yih Chun. / Secure location verification using simultaneous multilateration. In: IEEE Transactions on Wireless Communications. 2012 ; Vol. 11, No. 2. pp. 584-591.
@article{696bca24aaa447e2903aa81f06d2859a,
title = "Secure location verification using simultaneous multilateration",
abstract = "Substantial effort has been invested on secure location verification in hope to enable mobile wireless systems to optimize system performance or securely confer rights based on the participants' locations. However, most previous studies do not address the impact of, and are often susceptible to, collusion attacks in which adversaries share their private keys. In this paper, we propose a secure multilateration scheme. Given the same processing delay, detection threshold, and assuming zero synchronization error between verifiers, our proposed scheme achieves the highest rate of false-location detection by any verification system based solely on time-of-flight measurements. We also show that our scheme is resilient to collusion attacks if the verification system can detect the distance enlargement attack. We propose using other physical measurements to mitigate the distance enlargement, and thus also the collusion, attacks. To the best of our knowledge, this is the first attempt to prevent collusion attacks by mitigating the distance enlargement attack.",
keywords = "Location verification, distance bounding, multilateration",
author = "Chiang, {Jerry T.} and Haas, {Jason J.} and Jihyuk Choi and Hu, {Yih Chun}",
year = "2012",
month = "2",
day = "1",
doi = "10.1109/TWC.2011.120911.101147",
language = "English (US)",
volume = "11",
pages = "584--591",
journal = "IEEE Transactions on Wireless Communications",
issn = "1536-1276",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - Secure location verification using simultaneous multilateration

AU - Chiang, Jerry T.

AU - Haas, Jason J.

AU - Choi, Jihyuk

AU - Hu, Yih Chun

PY - 2012/2/1

Y1 - 2012/2/1

N2 - Substantial effort has been invested on secure location verification in hope to enable mobile wireless systems to optimize system performance or securely confer rights based on the participants' locations. However, most previous studies do not address the impact of, and are often susceptible to, collusion attacks in which adversaries share their private keys. In this paper, we propose a secure multilateration scheme. Given the same processing delay, detection threshold, and assuming zero synchronization error between verifiers, our proposed scheme achieves the highest rate of false-location detection by any verification system based solely on time-of-flight measurements. We also show that our scheme is resilient to collusion attacks if the verification system can detect the distance enlargement attack. We propose using other physical measurements to mitigate the distance enlargement, and thus also the collusion, attacks. To the best of our knowledge, this is the first attempt to prevent collusion attacks by mitigating the distance enlargement attack.

AB - Substantial effort has been invested on secure location verification in hope to enable mobile wireless systems to optimize system performance or securely confer rights based on the participants' locations. However, most previous studies do not address the impact of, and are often susceptible to, collusion attacks in which adversaries share their private keys. In this paper, we propose a secure multilateration scheme. Given the same processing delay, detection threshold, and assuming zero synchronization error between verifiers, our proposed scheme achieves the highest rate of false-location detection by any verification system based solely on time-of-flight measurements. We also show that our scheme is resilient to collusion attacks if the verification system can detect the distance enlargement attack. We propose using other physical measurements to mitigate the distance enlargement, and thus also the collusion, attacks. To the best of our knowledge, this is the first attempt to prevent collusion attacks by mitigating the distance enlargement attack.

KW - Location verification

KW - distance bounding

KW - multilateration

UR - http://www.scopus.com/inward/record.url?scp=84857363713&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84857363713&partnerID=8YFLogxK

U2 - 10.1109/TWC.2011.120911.101147

DO - 10.1109/TWC.2011.120911.101147

M3 - Article

AN - SCOPUS:84857363713

VL - 11

SP - 584

EP - 591

JO - IEEE Transactions on Wireless Communications

JF - IEEE Transactions on Wireless Communications

SN - 1536-1276

IS - 2

M1 - 6108305

ER -