Abstract
Wireless networks are becoming more and more commonplace, with ubiquitous computing flourishing in this ever expanding environment. As this occurs, the demand for a reliable method of locating devices has also increased dramatically. Locating devices with no a prioi knowledge is a very large problem, requiring much special equipment. Instead, we focus on the issue of location verification, a smaller aspect of the location issue. Distance bounding is a well respected technique used in this area, however it relies on precise calculations to locate a device. We propose a method of locating a device which does not rely on these calculations. Instead, we employ a binary “yes/no” visibility metric, where neighbouring devices indicate whether they can “see” or communicate directly with the claiming device. We confirm the existence of a direct link through excluding the possibility of a proxied connection being employed. The intersection of the ranges of these devices can then be used to extract a location area, without relying on calculating exact distances through precise timings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Theory and Application of Cryptographic Techniques, pp. 344–359 (1993)
Sastry, N., Shankar, U.: Wagner, D.: Secure verification of location claims. Technical report (2003)
Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (2003)
Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington D.C., pp. 67–73. IEEE Computer Society Press, Los Alamitos (2005)
Desmedt, Y.: Major security problems with the ’unforgeable’ (feige)-fiat-shamir proofs of identity and how to overcome them. In: Proceedings of SECURICOM 1988, Sixth Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)
Gabber, E., Wool, A.: How to prove where you are: racking the location of customer equipment. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 142–149. ACM, New York (1998)
Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: SASN 2005: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11–21. ACM Press, New York (2005)
Čapkun, S., Buttyán, L., Hubaux, J.P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM, New York (2003)
Capkun, S., Hubaux, J.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications: Special Issue on Security in Wireless Ad Hoc Networks 24, 221–232 (2006)
Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS 2007: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 204–213. ACM, New York (2007)
Association, I.S.: Ieee standards for information technology – local and metropolitan area network – part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. Published online (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Graham, M., Gray, D. (2009). Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)