Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5682))

Abstract

Wireless networks are becoming more and more commonplace, with ubiquitous computing flourishing in this ever expanding environment. As this occurs, the demand for a reliable method of locating devices has also increased dramatically. Locating devices with no a prioi knowledge is a very large problem, requiring much special equipment. Instead, we focus on the issue of location verification, a smaller aspect of the location issue. Distance bounding is a well respected technique used in this area, however it relies on precise calculations to locate a device. We propose a method of locating a device which does not rely on these calculations. Instead, we employ a binary “yes/no” visibility metric, where neighbouring devices indicate whether they can “see” or communicate directly with the claiming device. We confirm the existence of a direct link through excluding the possibility of a proxied connection being employed. The intersection of the ranges of these devices can then be used to extract a location area, without relying on calculating exact distances through precise timings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Theory and Application of Cryptographic Techniques, pp. 344–359 (1993)

    Google Scholar 

  2. Sastry, N., Shankar, U.: Wagner, D.: Secure verification of location claims. Technical report (2003)

    Google Scholar 

  3. Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (2003)

    Google Scholar 

  4. Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington D.C., pp. 67–73. IEEE Computer Society Press, Los Alamitos (2005)

    Chapter  Google Scholar 

  5. Desmedt, Y.: Major security problems with the ’unforgeable’ (feige)-fiat-shamir proofs of identity and how to overcome them. In: Proceedings of SECURICOM 1988, Sixth Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)

    Google Scholar 

  6. Gabber, E., Wool, A.: How to prove where you are: racking the location of customer equipment. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 142–149. ACM, New York (1998)

    Google Scholar 

  7. Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: SASN 2005: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11–21. ACM Press, New York (2005)

    Google Scholar 

  8. Čapkun, S., Buttyán, L., Hubaux, J.P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM, New York (2003)

    Google Scholar 

  9. Capkun, S., Hubaux, J.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications: Special Issue on Security in Wireless Ad Hoc Networks 24, 221–232 (2006)

    Article  Google Scholar 

  10. Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS 2007: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 204–213. ACM, New York (2007)

    Google Scholar 

  11. Association, I.S.: Ieee standards for information technology – local and metropolitan area network – part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. Published online (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Graham, M., Gray, D. (2009). Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03417-6_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03416-9

  • Online ISBN: 978-3-642-03417-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics