Abstract
Wireless networks are becoming more and more commonplace, with ubiquitous computing flourishing in this ever expanding environment. As this occurs, the demand for a reliable method of locating devices has also increased dramatically. Locating devices with no a prioi knowledge is a very large problem, requiring much special equipment. Instead, we focus on the issue of location verification, a smaller aspect of the location issue. Distance bounding is a well respected technique used in this area, however it relies on precise calculations to locate a device. We propose a method of locating a device which does not rely on these calculations. Instead, we employ a binary “yes/no” visibility metric, where neighbouring devices indicate whether they can “see” or communicate directly with the claiming device. We confirm the existence of a direct link through excluding the possibility of a proxied connection being employed. The intersection of the ranges of these devices can then be used to extract a location area, without relying on calculating exact distances through precise timings.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Theory and Application of Cryptographic Techniques, pp. 344–359 (1993)
Sastry, N., Shankar, U.: Wagner, D.: Secure verification of location claims. Technical report (2003)
Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (2003)
Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington D.C., pp. 67–73. IEEE Computer Society Press, Los Alamitos (2005)
Desmedt, Y.: Major security problems with the ’unforgeable’ (feige)-fiat-shamir proofs of identity and how to overcome them. In: Proceedings of SECURICOM 1988, Sixth Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)
Gabber, E., Wool, A.: How to prove where you are: racking the location of customer equipment. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 142–149. ACM, New York (1998)
Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: SASN 2005: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11–21. ACM Press, New York (2005)
Čapkun, S., Buttyán, L., Hubaux, J.P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM, New York (2003)
Capkun, S., Hubaux, J.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications: Special Issue on Security in Wireless Ad Hoc Networks 24, 221–232 (2006)
Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS 2007: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 204–213. ACM, New York (2007)
Association, I.S.: Ieee standards for information technology – local and metropolitan area network – part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. Published online (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Graham, M., Gray, D. (2009). Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)