An information theoretic Location Verification System for wireless networks

As location-based applications become ubiquitous in emerging wireless networks, a reliable Location Verification System (LVS) will be of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No “malicious decision” to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, where verification of location information is of paramount importance.

[1]  Robert A. Malaney,et al.  Quantum Location Verification in Noisy Channels , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[2]  Robert A. Malaney,et al.  Location-dependent communications using quantum entanglement , 2010, 1003.0949.

[3]  Robert A. Malaney Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.

[4]  Dan Wu,et al.  A Node-to-Node Location Verification Method , 2010, IEEE Transactions on Industrial Electronics.

[5]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..

[6]  Yu Zhang,et al.  Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.

[7]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[8]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[9]  Guofei Gu,et al.  Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.

[10]  Constantine Kotropoulos,et al.  Gaussian Mixture Modeling by Exploiting the Mahalanobis Distance , 2008, IEEE Transactions on Signal Processing.

[11]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[13]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, OPODIS.

[14]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2014, SIAM J. Comput..

[15]  Boris Skoric,et al.  An Information-Theoretic Measure of Intrusion Detection Capability , 2005 .

[16]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[17]  Maria Isabel Ribeiro,et al.  Gaussian Probability Density Functions: Properties and Error Characterization , 2004 .

[18]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[20]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[21]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[22]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[23]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.