receivedat a particular spot on earth’s surface at a par-
ticular time instant because the signals are affected by
many different influences, e.g. by the ionosphere or
the weather conditions. The trajectory of the satel-
lites is defined in advance and this information is pub-
lished in the GPS signals in form of the so called
ephemeris and almanac data; however, the actual tra-
jectory of the satellites isn’t exactly the one defined
in advance and subject to random influences. At the
backend the raw signal reported from the mobile de-
vice will be compared to those reported by trusted
reference stations in the proximity of the alleged lo-
cation of the mobile device. The authors of the Cy-
berLocator paper state that the distance between ref-
erence station and mobile device shouldn’t be larger
than 3.000 kilometres; unfortunately the authors of
CyberLocator don’t explain how they calculated this
maximum distance between mobile device and refer-
ence station. Also rerouting attacks (see section 2) are
considered, i.e. a colluding user that actually stays
at the alleged location forwards the received raw sig-
nals to the attacker. However, for the CyberLoca-
tor system it is demanded that the radio fingerprint
is forwarded within 5 milliseconds because it is as-
sumed that rerouting would cause additional latency
beyond that threshold. It seems quite demanding to
meet the maximum latency time of 5 ms even when
not performinga rerouting attack, since UMTS-HSPA
causes a latency of 150 ms, and even wire-bound in-
ternet connections over DSL have a latency of at least
20 ms.
Another system to prevent spoofing is called Lo-
cation Aware Access Control (LAAC) and was de-
vised by Cho and colleagues (2006) . Unlike the Cy-
berLocator this system is based on dedicated location
keys that are emitted by the base stations of a wire-
less local area network (WLAN). The location keys
are randomlychosen bit sequences which are renewed
periodically (e.g. every five seconds). These location
keys are reported to the backend system. The mobile
device has to combine all the location keys it receives
from different base stations within a given timeframe
and combine them by using the XOR-function. Af-
terwards the result of this calculation is then the input
for a hash function whose output is the actual location
key that has to be transmitted to the backend. Since
the backend knows all the current location keys used
by the base stations it is able to calculate the hash val-
ues like the mobile device to verify the correctness of
the received location keys. A further feature of the
system is that the radiation angle of the base stations
can be controlled by using special antennas. If we
have two base stations with a radiation angle of 90° it
is possible to arrange these base stations in a way so
that the area where the waves of both stations can be
received has a rectangular shape. This is an interest-
ing feature to obtain regions that cover the premises
of a business like a restaurant, a hotel or a theme park
where the currently present customers should be able
to access a particular wireless service (e.g. free in-
ternet access, special information services). The au-
thors of LAACs don’t describe arrangements to pre-
vent rerouting attacks but this has to be interpreted by
considering the application scenario that is primarily
addressed, namely to restrict free wireless internet ac-
cess to users staying in a particular area. For rerouting
the colluding attackers usually need a fast data trans-
mission connection; however, if this connection is al-
ready available there is no need to perform a spoofing
attack to gain internet access.
Malaney (2007) proposes a system based for in-
door WLANs. The aim of this system is that mobile
devices should be able to prove that they are within
a building. It is assumed that only authorized people
can enter the building (e.g. because there is a gate-
keeper) and should have access to the WLAN. The
mobile devices have to calculate their position (e.g.
based on GPS or a special indoor locating-system)
and measure the signal strength of all the WLAN ac-
cess points they can receive at the current location.
These values have to be reported to a central server
that makes the decision if the mobile device should
get access or not: it is checked if the reported position
lies within the building and then if the reported signal
strength pattern matches the signal strength pattern
for that location. In this scenario the signal strength
pattern of the WLAN access points at a particular lo-
cation can be considered as non-dedicated location
key because unauthorized people cannot get into the
building to measure the signal strength. There are
simulation models to calculate an estimation of a sig-
nal strength pattern at a given location; however, to
work with these models it is necessary to know the
building plan, the locations of the access points and
the specific attenuation characteristics of the walls
and furniture in the building.
In literature so far no anti-spoofing-approach can
be found that is based on natural location keys. How-
ever, the cosmic background radiation could act as
one because it is receivable at each point of the earth’s
surface for a given time instant with a specific pat-
tern. A further dimension for the discrimination of
location-key methods would be to differentiate be-
tween singular and multiple keys. For singular keys
(e.g. CyberLocator) each location key stands for one
area while for multiple keys (e.g. Malaney’s system)
the location keys may overlap for some regions.
ICE-B 2009 - International Conference on E-business
112