secure localization using dynamic verifiers
DESCRIPTION
Secure Localization using Dynamic Verifiers. Nashad A. Safa Joint Work With S. Sarkar , R. Safavi - Naini and M.Ghaderi. Importance of Secure Localization. Location-based Secret communication Communication between different military establishments Position-based Access control - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/1.jpg)
Secure Localization using Dynamic Verifiers
Nashad A. SafaJoint Work With
S. Sarkar, R. Safavi-Naini and M.Ghaderi
![Page 2: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/2.jpg)
2/23
Importance of Secure Localization Location-based Secret
communication– Communication between different
military establishments
Position-based Access control– Limit access to resources (e.g.
printer) from some specific location– Pizza-delivery company may want
to be sure the order actually came from the claimed position.
Location based routing in wireless sensor network
![Page 3: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/3.jpg)
3/23
Outline
Problem Description Model and Assumptions Contributions Protocol View ResultsConclusion and Future Works
![Page 4: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/4.jpg)
4/23
Problem Description Two Variants of Secure Localization Protocols– Positioning
• Provide relative or absolute location of nodes within a network• Can be Node centric or Infrastructure centric
– Distance Bounding• Determine an upper bound for the physical distance between
two parties• Prevent two parties from appearing closer together than they
actually are• Can be Node centric or Infrastructure centric
– Proposed Protocol is for secure positioning
![Page 5: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/5.jpg)
5/23
Secure Positioning
Verifiers(V)
Adversaries (A)
Prover( at position P)
![Page 6: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/6.jpg)
6/23
Common Distance Measurement Techniques
• Available techniques– Received Signal Strength (RSS): • Exploits the inverse relationship between signal
strength and distance to estimate the distance of the transmitter
– Time-of-Flight (ToF): • Measures elapsed time for a message exchange to
estimate distance based on communication medium’s propagation speed.• Time-of-Arrival (ToA)
![Page 7: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/7.jpg)
7/23
Model and Assumptions
Multiple VerifiersMultilateration/Triangulation
Capabilities of Adversary Directional Antenna Jam CommunicationCreate wormhole
Strongest attack model Collusion Attack
o A set of nodes are corrupted o Colluding nodes share a
secret channelo No known localization protocol is
secure against this attack
P
Colluding Nodes
False Claim
![Page 8: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/8.jpg)
8/23
Collusion Attack
P
Ai
r A2
A3
A1
V3
V1
Vi
V2
Time required for travelling a message from Vi to P is Ti
Time required for travelling a message from P to any Ai is α
dist(1,2)
Vi sends message at time t
Ai receives Message at time t+Ti -α
Attack Scenario
Vi accepts response at t+2Ti
V3 accepts response at t+Ti +T3
V2 accepts response at t+Ti +T2
V1 accepts response at t+Ti +T1
Ai waits for time 2α-(dist(Ai ,Aj )/c) for adversary Aj , then send it to Aj
A1 receives message and sends response at t+Ti +α
A2 receives message and sends response at t+Ti +α
A3 receives message and sends response at t+Ti +α
Ai sends response at t+Ti +α
![Page 9: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/9.jpg)
9/23
Related Work• “Secure localization with hidden and mobile
base stations”- Capkun et al, INFOCOM (2006)-– Hidden/Mobile base stations– Node centric/Infrastructure centric positioning
• “Position-based Cryptography”-N. Chandran et al, CRYPTO (2009)– Impossibility of security against collusion attack– Bounded Retrieval Model– No pre-sharing of keys
![Page 10: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/10.jpg)
10/23
ContributionsSecure location verification protocol (SLDV)
Use user nodes as dynamic verifiers Assume Majority of the users are honest Random Selection of users
No pre-shared key between prover and verifiers Key is established after successful verification
Secure against collusion attack Probability of detecting collusion attack Simulation
Hybrid approach with hidden based stations
![Page 11: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/11.jpg)
11/23
Receive challenge ch at time tp
Protocol SLDV
Broadcast {ID1 ,ID2, ..}
Send random nonce ch and Sign(ch)–at time t
User List1. ID,location,skey,IV 2. ID,location,skey,IV
3. -------------------------
Receive response at time tv2Receive response
at time tv1
Receive response at time tv3
Receive response at time t1
Check correctness of tv1 and response
Check correctness of tv2
and response
Check correctness of tv3
and response
Send
Broadcast response: (ch, PubE(IV,k))
Select dynamic verifiers : { ID1
,ID2 ,.. }IDi (new)= IDi (prev) xor SymE(IVi, ki )
DV
Prover
Selected DV
Send Verification Result
Claim location p
Receive response at time t2
Check nonce correctness and send response times and own locations
Share correctness results
Take majority decision from all DV and threshold decision from Verifiers
![Page 12: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/12.jpg)
12/23
Security Properties: SLDV• Case-1: Adversary does not know locations of usersProbability of Detecting collusion attack:
,where,
• Case-2: Adversary knows locations of usersProbability of Detecting collusion attack:
))2)1(/
809.0)(1((1 2/k
pdhdhSLDV hNrPPP
])1[(
2/
ikp
ip
k
kidh hh
ik
P
))2)1(/
809.0)(1((1' 2/k
pdhmdhmSLDV hNrPPP
![Page 13: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/13.jpg)
13/23
Security: SLDV (Location is unknown)
![Page 14: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/14.jpg)
14/23
Security: SLDV (Location is known)
![Page 15: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/15.jpg)
15/23
Simulation Results (Location is unknown)
![Page 16: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/16.jpg)
16/23
Simulation Results (Location is known)
![Page 17: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/17.jpg)
17/23
Hybrid Approach
Combine hidden base station & dynamic verifier system Use a subset of the hidden base stations Require less dynamic verifiers Save on infrastructure Better performance with less trust on users
![Page 18: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/18.jpg)
18/23
Hybrid Approach
![Page 19: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/19.jpg)
19/23
Hybrid Approach
hp =0.7
![Page 20: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/20.jpg)
20/23
Security Analysis
Security
Protection offered by Cryptographic
Constructs
Protection offered by Positioning of dynamic
verifiers
xA xColluder’s locationClaimed location
Dynamic verifier
Single Colluder
DV can not detect false claim when xA =x
![Page 21: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/21.jpg)
21/23
Security Analysis
xA x
yyA
Single Colluder- Multiple DVMultiple
Colluders- Multiple DV
Colluder’s locationClaimed location
Dynamic verifier
Can not Detect when xA =x &
yA = y
![Page 22: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/22.jpg)
22/23
Future Works
• Adding a reputation system to enhance the dynamic verifier selection process.
• Implementation of the protocol in real wireless environment.
• Extension of the protocol when prover and verifier has pre-shared key
![Page 23: Secure Localization using Dynamic Verifiers](https://reader036.vdocument.in/reader036/viewer/2022062323/5681642c550346895dd5eee7/html5/thumbnails/23.jpg)
23/23
Questions?