Abstract
Certain location-based services seek to spontaneously authenticate user location without the need to have a pre-existing relationship with each user, or with each location provider. We introduce an intelligent infrastructure-based solution that provides spontaneous, rapid, and robust mobile device location authentication by supplementing existing 802.11x APs with femtocells. We show that by transferring data to a mobile device associated with a femtocell while remotely monitoring its traffic activity, a sender can verify the cooperating receiver’s location. We explain how to design data transmissions with distinct traffic signatures that can be rapidly and reliably detected even in the presence of heavy cross-traffic introduced by other femtocell users. Neither mobile operators nor location providers need be aware that an authentication is taking place.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Netravali, R., Brassil, J.: Femtocell-assisted Location Authentication (poster/extended abstract). In: IEEE LANMAN 2011 (October 2011)
Chandrasekhar, V., Andrews, J., Gatherer, A.: Femtocell Networks: A Survey. IEEE Communications Magazine 46(9), 59–67 (2008)
Kent, S.: IP Encapsulating Security Payload (ESP). IETF RFC 4303 (2005)
Brassil, J., Manadhata, P.K.: Proving the Location of a Mobile Device User. In: 2012 Virgina Tech Wireless Symposium (May 2012)
Brassil, J., Manadhata, P.K.: Securing a Femtocell-based Location Service. In: Intl. Conf. on Sel. Areas in Mobile and Wireless Networking (iCOST 2012) (June 2012)
Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. In: Computer Fraud & Security (February 1996)
Kindberg, T., Zhang, K., Shankar, N.: Context Authentication Using Constrained Channels. In: Proc. of Fourth IEEE WMCSA, pp. 14–21 (2002)
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Luo, W., Hengartner, U.: VeriPlace: A Privacy-Aware Location Proof Architecture. In: Proc. of 18th ACM SIGSPATIAL GIS 2010, pp. 23–32 (2010)
Saroiu, S., Wolman, A.: Enabling New Mobile Applications with Location Proofs. In: Proc. of HotMobile 2009, pp. 1–6 (2009)
Lenders, V., Koukoumidis, E., Zhang, P., Martonosi, M.: Location-based Trust for Mobile User-Generated Contents: Applications, Challenges and Implementations. In: Proc. of Hotmobile 2008 (2008)
Dua, A., Bulusu, N., Hu, W., Feng, W.: Towards Trustworthy Participatory Sensing. In: Proc. of USENIX HotSec (August 2009)
Saroiu, S., Wolman, A.: I Am a Sensor, and I Approve This Message. In: Proc. of HotMobile 2010, pp. 37–42 (2010)
Gilbert, P., Jung, J., Lee, K., Qin, H., Sharkey, D., Sheth, A., Cox, L.: YouProve: Authenticity and Fidelity in Mobile Sensing. ACM SenSys (2011)
Faria, D., Cheriton, D.: No Long-term Secrets: Location Based Security in Overprovisioned Wireless LANs. In: Proc. HotNets-III (2004)
Wei, Y., Zeng, K., Mohapatra, P.: Adaptive Wireless Channel Probing for Shared Key Generation. In: Proc. of IEEE Infocom 2011 (2011)
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location Privacy via Private Proximity Testing. In: Proc. of NDSS 2011 (2011)
Zhang, Y., Li, Z., Trappe, W.: Power-Modulated Challenge-Response Schemes for Verifying Location Claims. In: IEEE Globecom 2007 (2007)
Talasila, M., Curtmola, R., Borcea, C.: Location Verification through Immediate Neighbors Knowledge. In: Proc. of Mobiquitous 2010 (2010)
Kirkpatrick, M., Bertino, E.: Enforcing Spatial Constraints for Mobile RBAC Systems. In: Proc. SACMAT 2010, pp. 99–108 (2010)
Skyhook Wireless, http://www.skyhookwireless.com/
Tippenhauer, N., Rasmussen, K., Popper, C., Capkun, S.: Attacks on Public WLAN-based Positioning. In: Proc. of MobiSys 2009 (2009)
LOC-AID, Inc., http://www.loc-aid.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Brassil, J., Manadhata, P.K. (2012). Verifying the Location of a Mobile Device User. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33392-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-33392-7_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33391-0
Online ISBN: 978-3-642-33392-7
eBook Packages: Computer ScienceComputer Science (R0)