Skip to main content

Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12553))

Included in the following conference series:

  • 720 Accesses

Abstract

Since IoT devices have small computing power and limited battery size, it is desirable that the number of communications be as small as possible. To solve such a request, we propose a calculation method based on triangulation. The feature of our method is that the number of communications is one round trip, and sufficient computational security is realized with small entropy secret information using W-OTS+ and HMAC. In this paper, “small entropy” means a 8-digit integer (about 24 [bit]) that can be memorized by humans. We show an example calculation and analyze the relationship between accuracy of position measurement and security. From the results, we conclude that our method has sufficient security and enough practicality using small entropy secret information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_1

    Chapter  Google Scholar 

  2. Advanced Google Maps Distance Calculator. https://www.daftlogic.com/projects-advanced-google-maps-distance-calculator.htm

  3. Bluetooth SIG. https://www.bluetooth.com

  4. The Christian Science: Exclusive: Iran hijacked US drone, says Iranian engineer. https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer

  5. Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24654-1_13

    Chapter  Google Scholar 

  6. Google maps with my location. http://www.google.com/ mobile/gmm/mylocation/index.html

  7. Geodetic Reference System 1980 (GRS80), Bulletin Geodesique, Vol 54:3, 1980. Republished (with corrections) in Moritz, H., 2000,"Geodetic Reference System 1980," J. Geod. 74(1), pp. 128–162

    Google Scholar 

  8. Hülsing, A.: W-OTS+ – shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173–188. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38553-7_10

    Chapter  Google Scholar 

  9. Apple: iBeacon. https://developer.apple.com/ibeacon/

  10. IP location finder. https://www.iplocation.net

  11. IP address location lookup. http://www.ipfingerprints.com

  12. Kuusniemi, H., Lohan, E.S., Järvinen, K., et al.: Information security of location estimation increasing trustworthiness. ESA NAVITEC 2016. https://www.researchgate.net/publication/313288754_INFORMATION_SECURITY_OF_LOCATION_ESTIMATION_-_INCREASING_TRUSTWORTHINESS

  13. Meltdown and Spectre -Vulnerabilities in modern computers leak passwords and sensitive data. https://meltdownattack.com

  14. Skyhook. http://www.skyhookwireless.com/

  15. Tanaka, H., Wang, L., Ichikawa, R., Iwama, T., Koyama, Y.: Position authentication using homomorphic encryption. IEICE Trans. Inf. Syst. 96(8), 1913–1924 (2013)

    Google Scholar 

  16. Vincenty, T.: Direct and inverse solutions of geodesics on the ellipsoid with application of nested equations. Surv. Rev. 23(176), 88–93 (1975)

    Article  Google Scholar 

  17. Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent IP geolocation. In: 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011). https://www.usenix.org/legacy/events/nsdi11/tech/full_papers/Wang_Yong.pdf

  18. World Geodetic System 1984 (WGS 84). https://cddis.nasa.gov/926/egm96/doc/S11.HTML

Download references

Acknowldgement

This work was supported by JSPS KAKENHI Grant Number 17K06455.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hidema Tanaka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tanaka, H., Fukushima, K. (2020). Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. In: Kanhere, S., Patil, V.T., Sural, S., Gaur, M.S. (eds) Information Systems Security. ICISS 2020. Lecture Notes in Computer Science(), vol 12553. Springer, Cham. https://doi.org/10.1007/978-3-030-65610-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65610-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65609-6

  • Online ISBN: 978-3-030-65610-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics