Secure location verification with hidden and mobile base stations

被引:83
|
作者
Capkun, Srdjan [1 ]
Rasmussen, Kasper Bonne [1 ]
Cagalj, Mario [2 ]
Srivastava, Mani [3 ]
机构
[1] ETH, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Univ Split, FESB, Dept Elect, Split 21000, Croatia
[3] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
关键词
mobility; location verification; security; wireless networks;
D O I
10.1109/TMC.2007.70782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques, ultrasonic or radio, based on the received signal strength or signal time of flight. Through several examples, we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad hoc and sensor networks.
引用
收藏
页码:470 / 483
页数:14
相关论文
共 50 条
  • [1] Secure localization with hidden and mobile base stations
    Capkun, Srdjan
    Cagalj, Mario
    Srivastava, Mani
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2574 - 2583
  • [2] Secure Location Verification with a Mobile Receiver
    Baker, Richard
    Martinovic, Ivan
    [J]. CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, : 35 - 46
  • [3] Optimizing the Location Deployment of Dynamic Mobile Base Stations
    Bhattarai, Sulabh
    Wei, Sixiao
    Rook, Stephen
    Yu, Wei
    Griffith, David
    Golmie, Nada
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 579 - 583
  • [4] Secure Base Stations
    Bosch, Peter
    Brusilovsky, Alec
    McLellan, Rae
    Mullender, Sape
    Polakos, Paul
    [J]. BELL LABS TECHNICAL JOURNAL, 2009, 13 (04) : 227 - 243
  • [5] Optimal base stations location and configuration for cellular mobile networks
    Selim, Shokri Z.
    Almoghathawi, Yasser A.
    Aldajani, Mansour
    [J]. WIRELESS NETWORKS, 2015, 21 (01) : 13 - 19
  • [6] Optimal base stations location and configuration for cellular mobile networks
    Shokri Z. Selim
    Yasser A. Almoghathawi
    Mansour Aldajani
    [J]. Wireless Networks, 2015, 21 : 13 - 19
  • [7] Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations
    Huang, Jie
    Huang, Chin-Tser
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [8] Location estimation and trajectory prediction for cellular networks with mobile base stations
    Pathirana, PN
    Savkin, AV
    Jha, S
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2004, 53 (06) : 1903 - 1913
  • [9] Secure Location Verification: Why You Want Your Verifiers to Be Mobile
    Schafer, Matthias
    Nogueira, Carolina
    Schmitt, Jens B.
    Lenders, Vincent
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 419 - 437
  • [10] A sequential algorithm for optimal base stations location in a mobile radio network
    Santiago, RC
    Lyandres, V
    [J]. 2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2895 - 2899