Computational geometry: an introduction
Computational geometry: an introduction
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Location-based authentication: grounding cyberspace for better security
Internet besieged
How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Location constraints in digital rights management
Computer Communications
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Secure localization with phantom node detection
Ad Hoc Networks
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Position-based quantum cryptography: impossibility and constructions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
How to construct secure cryptographic location-based services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Hi-index | 0.00 |
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the difference between propagation speeds of radio and sound waves to estimate the position of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted by the prover and the distributed topology of the network. The idea is to separate the functions of the sensors. Some sensors are placed such that they get the signal from the prover if it is inside the protected area. The others are positioned so that they can only get the signal from the prover outside the area. Hence the latter sensors reject the prover if they hear its signal. Our solution is versatile and deals with provers using either omni-directional or directional propagation of radio signals without requiring any special hardware besides a radio transceiver. We estimate the bounds on the number of sensors required to protect the areas of various shapes and extend our solution to handle complex radio signal propagation, optimize sensor placement and operate without precise topology information.