1 / 13

Secure Verification of Location Claims

Secure Verification of Location Claims. In the physical world, identity is not the only thing that matters. Physical location of the requester plays an important role in determining access rights.

ewan
Download Presentation

Secure Verification of Location Claims

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Verification of Location Claims • In the physical world, identity is not the only thing that matters. • Physical location of the requester plays an important role in determining access rights. • Secure Verification of Location Claims comes natural in the physical world but not in information systems. • Location verification enables the Secure Verification of Location Claims. • Secure Verification of Location Claims benefits: • It is Natural . • No need to establish shared secrets in advance. By Alvaro E. Escobar

  2. .p .v R Secure Verification of Location Claims • Let be a set of Verifiers V, Prover p and Region R. • location determination problem : verifier actively seeks prover’s exact location. • In-region verification problem : prover claims a location and verifier accepts or rejects it. • In-region verification problem is easier to tackle. • p claims to be in R and v ∈ V accepts or rejects. By Alvaro E. Escobar

  3. Secure Verification of Location Claims • Model Assumptions: • No attempt to verify exact location of the prover. • Attempt t verify location claims for regions R near V. • Verifier and prover communicate using RF (radio frequency at the speed of light ) and sound (ultrasound at the speed of sound). • Prover must be able to bound its processing delay (time to digest signal). • Prover and verifier know region R a priori. By Alvaro E. Escobar

  4. Secure Verification of Location Claims • Model Protocol • Does not require Cryptography • Does not require time synchronization • Does not require any prover – verifier agreement. • Suitable for low-cost sensor networks (low CPU and Memory reqs.). • Uses Time-of-Flight to estimate distance. • p ---RF--- v : p reports location l • v ---RF--- p : v sends nonce N (at light speed c) • p --Sound- v : p sends nonce N (at sound speed s) v accepts location claim iff: l≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) By Alvaro E. Escobar

  5. Secure Verification of Location Claims • Possible Attacks • Prover tries to cheat by delaying response. • Not good. Will appear to be further away. • Prover tries to cheat by starting response transmission early. • Not possible. Nonce is randomly generated and must be known before response. • p ---RF--- v : p reports location l • v ---RF--- p : v sends nonce N (at light speed c) • p --Sound- v : p sends nonce N (at sound speed s) v accepts location claim iff: l≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) By Alvaro E. Escobar

  6. Secure Verification of Location Claims • Processing Delay • Prover requires some time (∆p) to process nonce N. • Prover is aware of its ∆p and reports it to the verifier. • p ---RF--- v : p reports location l and ∆p • v ---RF--- p : v sends nonce N (at light speed c) • p --Sound- v : p sends nonce N (after ∆p seconds) v accepts location claim iff: l≤ R AND elapsed time ≤ d( v , l ) . (c-1 + s-1) + ∆p By Alvaro E. Escobar

  7. .p l≤ R - s∆p .v R Secure Verification of Location Claims • Possible Attacks….again. • Prover tries to cheat by reporting location l at border of region R and overstating processing delay ∆p. • Verifier shrinks allowable region by s.∆p. • ROA(v,∆p) : Region Of Acceptance where location claims are permitted by v if the claimed processing delay is ∆p. • ROA(v,0) = R By Alvaro E. Escobar

  8. Secure Verification of Location Claims • Non-uniform Regions • ROA must be a circle since signals travel at the same speed in all directions. • ROA must be wholly contained in region R so as to not accept a location claim outside of R. • ROA should be largest circle that fits within R. ROA(v,0) .p .v ROA(v,∆p) R By Alvaro E. Escobar

  9. ROA(∆p) .v .p .v .v R Secure Verification of Location Claims • Non-uniform Regions…continue. • Let ROA(∆p) region where at least one verifier node can prove location claim. • ROA(∆p) = ỤROA(v,∆p) • More than one verifier might be eligible. • Prover does not gain any advantage by selecting a different verifier. • Coverage = ROA(∆p) / R By Alvaro E. Escobar

  10. Secure Verification of Location Claims • Possible Attacks….once more. • “remote actuation” : complice inside R helps remote attacker. • Low-delay remote actuation of sonic signals is infeasible. By Alvaro E. Escobar

  11. ROA(∆p) .v .p .v .v R Secure Verification of Location Claims • Rejected Variants: • (radio, sound)  (radio, radio) • Error term ∆p.c would be very large (may exceed R and verifier may not accept location claims at all. • (radio, sound)  (sound, radio) or (sound, sound) • May attack with laser-based “remote bugging” of sound. By Alvaro E. Escobar

  12. ROA(∆p) .v .p .v .v R Secure Verification of Location Claims • Protocol Variant: • Keyed Echo Protocol • All verifiers and a prover share a key, therefore verifier can verify that a particular prover is inside R. • p ---RF--- v : p reports location l and ∆p • v ---RF--- p : v sends nonce N (at light speed c) • p --Sound- v : p sends nonce N (after ∆p seconds) By Alvaro E. Escobar

  13. Secure Verification of Location Claims • Future Work: • More precise region verification. • Location-limited channels : Comm. Mechanism restricted to short range. • GPS (Global Positioning System) : Do not address security By Alvaro E. Escobar

More Related