1 / 7

Secure Space: Location-based Secure Wireless Group Communication

Secure Space: Location-based Secure Wireless Group Communication. Arunesh Mishra, Suman Banerjee Department of Computer Science, University of Maryland, College Park, MD 20742, USA. Introduction(1/1).

jerrod
Download Presentation

Secure Space: Location-based Secure Wireless Group Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Space: Location-based Secure Wireless Group Communication Arunesh Mishra, Suman Banerjee Department of Computer Science, University of Maryland, College Park, MD 20742, USA

  2. Introduction(1/1) • We define “Secure Space” as an enclosed area within which wireless devices can participate in secure group communication. • There are two important problem for this discussion --- (a) determining and authenticating the location of a wireless device at the granularity of a secure space, and (b) defining scalable mechanisms to (re)-distribute a common group key among the device inside the secure space, as new devices enter and existing devices leave the space.

  3. Location Determination and Authentication System (LDAS)(1/2) • We define a LDAS using RF signal-strength based techniques. Our scheme requires the use of one or more trusted wireless device in the infrastructure. The trusted devices transmit beacon frames on the wireless channel and the untrusted devices are authenticated if they can prove to the LDAS that they “correctly” received these frames. • We create a radio map of the space. The untrusted device must present a signal strength tuple back to the LDAS, where the tuple consists <beacon idetifier, received signal strength>.

  4. Location Determination and Authentication System (LDAS)(2/2) • The LDAS checks if the received signal strength value matches the corresponding value in the radio map, for each of the beacons, in which case the location is identified and considered authenticated, else the authentication is failure. • The power is picked randomly based upon the anonymity of the beacon source, as well as the use of random power value with which the beacon is transmitted. Without this information it is not possible for untrusted devices that are external to the LDAS to infer the correct signal-strength tuple for any other location.

  5. LDAS example(1/1) • Consider the two trusted devices T1 and T2 that broadcast two beacon frames b1 and b2. • There are two untrusted devices, U0 and U1, are waiting for being authenticated. Step1 :b1 and b2 randomly choose two power value, say 100mW and 10mW. Step2 :U0 receives the signal which is powered 60mW from b1 and 2mw from b2, and U1 receives the signal which is powered 20mW from b1 and 6mW from b2. Step3 : If U0 and U1 returns the signal strength tuples as {< b1 ,60mW>, < b2 , 2mW>} and {< b1 ,20mW>, < b2 , 6mW>} Then they are authenticated with respect to the radio map available at LDAS, and their location are correctly determined.

  6. Simplified example of the LDAS in one dimension

  7. Secure Wireless Group Communication(1/1) • Single group key • Group re-keying

More Related