PREVENTION OF LOCATION-SPOOFING - A Survey on Different Methods to Prevent the Manipulation of Locating-Technologies

Michael Decker

Abstract

There are many different locating technologies to determine a mobile device's current position. Examples for such technologies are the satellite-based Global Positioning System (GPS), the cell-ID method in mobile phone networks or WLAN-based approaches. These technologies are the enabler of so called em Location-based Services (LBS): LBS are services to be used with mobile handheld-computers like PDAs or smartphones that evaluate a mobile user's position. When locating-technologies are discussed in the LBS community, the focus is often on the accuracy of the calculated location whereas the resistance to manipulation attempts by the possessor of the mobile device or by third-parties is almost never considered. But there are examples of LBS where users or external attackers might have an incentive to manipulate the locating system. This is termed as em location spoofing . This article presents a survey of different technical approaches to prevent or at least to detect location spoofing.

References

  1. Capkun, S., Cagalj, M., and Srivastava, M. (2006). Secure localization with hidden and mobile base stations. In Proceedings of IEEE INFOCOM 2006, pages 1-10.
  2. Cho, Y., Bao, L., and Goodrich, M. T. (2006). LAAC: A Location-Aware Access Control Protocol. In Mobile and Ubiquitous Systems, pages 1-7.
  3. Denning, D. E. and MacDoran, P. F. (1996). LocationBased Authentication. Computer Fraud & Security, 1996(2):12-16.
  4. Gabber, E. and Wool, A. (1998). How to prove where you are. In ACM Conference on Computer and Communications Security, pages 142-149.
  5. K├╝pper, A. (2007). Location-based Services. John Wiley & Sons, Chichester, U.K.
  6. Malaney, R. A. (2007). Securing Wi-Fi Networks with Position Verification (Extended Version). International Journal of Security Networks, 2(1-2):27-36.
  7. Mundt, T. (2005). Location Dependent Digital Rights Management. In ISCC 2005, pages 617-622.
  8. Sastry, N., Shankar, U., and Wagner, D. (2003). Secure Verification of Location Claims. In 2nd ACM Workshop on Wireless Security, pages 1-10, San Diego, USA.
  9. Vora, A. and Nesterenko, M. (2006). Secure Location Verification using Radio Broadcast. IEEE Transactions on Dependable and Secure Computing, 3(4):377-385.
  10. Warner, J. S. and Johnston, R. G. (2003). GPS Spoofing Countermeasures. Technical Report LAUR-03-6163, Los Alamos National Laboratory (USA).
  11. Waters, B. R. and Felten, E. W. (2003). Secure, private proofs of location. Technical Report TR-667-03, Princeton University.
Download


Paper Citation


in Harvard Style

Decker M. (2009). PREVENTION OF LOCATION-SPOOFING - A Survey on Different Methods to Prevent the Manipulation of Locating-Technologies . In Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2009) ISBN 978-989-674-006-1, pages 109-114. DOI: 10.5220/0002232601090114


in Bibtex Style

@conference{ice-b09,
author={Michael Decker},
title={PREVENTION OF LOCATION-SPOOFING - A Survey on Different Methods to Prevent the Manipulation of Locating-Technologies},
booktitle={Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2009)},
year={2009},
pages={109-114},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002232601090114},
isbn={978-989-674-006-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2009)
TI - PREVENTION OF LOCATION-SPOOFING - A Survey on Different Methods to Prevent the Manipulation of Locating-Technologies
SN - 978-989-674-006-1
AU - Decker M.
PY - 2009
SP - 109
EP - 114
DO - 10.5220/0002232601090114