Skip to main content

Security of Embedded Location Systems

  • Chapter
  • First Online:
Secure Smart Embedded Devices, Platforms and Applications

Abstract

Determining the location and movement of objects or people is a core requirement in a number of embedded systems. To ensure that the location information gathered by embedded devices is accurate, the underlying method of location systems must be secure and reliable. This chapter provides an overview of the basic approaches for determining location information in embedded systems. The resilience of these methods against advanced attacks are discussed, along with proposals for securely verifying physical location estimates. Finally, the security aspects of global navigation space systems (GNSS) used for location information in embedded applications are briefly discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C.A. Patterson, R.R. Muntz and C.M. Pancake. ‘Challenges in Location-Aware Computing’. IEEE Pervasive Computing, Vol. 2, No. 2, pp 80–89, June 2003.

    Google Scholar 

  2. A. Boukerche, H.A.B. Oliveira, E.F. Nakamura and A.A.F. Loureiro. ‘Secure Localization Algorithms for Wireless Sensor Networks’. IEEE Communications Magazine, Vol. 46, No. 4, pp 96–101, April 2008.

    Google Scholar 

  3. A.I.G-T. Ferreres, B.R. Alvarez and A.R. Garnacho. ‘Gauranteeing the Authenticity of Location Information’. IEEE Pervasive Computing, Vol. 7, No. 3, pp 72–79, July 2008.

    Google Scholar 

  4. Y. Zhou, Y. Fang and Y. Zhang. ‘Securing Wireless Sensor Networks: a Survey’. IEEE Communications Surveys & Tutorials, Vol. 10, No. 3, pp 6–28, September 2008.

    Google Scholar 

  5. X. Chen, K. Makki, K. Yen and N. Pissinou. ‘Sensor Network Security: A Survey’. IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, pp 52–73, 2009.

    Google Scholar 

  6. ISO/IEC 24730. Information technology - Real-time locating systems (RTLS).

    Google Scholar 

  7. N.O. Tippenhauer, K.B. Rasmussen, C. Popper and S. Čapkun. ‘Attacks on Public WLAN-based Positioning Systems’. Proceedings of ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.

    Google Scholar 

  8. G.P. Hancke, K. Mayes, and K. Markantonakis. ‘Confidence in Smart Token Proximity: Relay Attacks Revisited’. Elsevier Computers & Security, June 2009.

    Google Scholar 

  9. Y. Desmedt, C. Goutier and S. Bengio. ‘Special Uses and Abuses of the Fiat-Shamir Passport Protocol’. Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 293, pp. 21, 1987.

    Google Scholar 

  10. Y.C. Hu, A. Perrig and D.B. Johnson. ‘Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks’. Proceedings of INFOCOM, pp. 1976–1986, April 2003.

    Google Scholar 

  11. G.P. Hancke and M.G. Kuhn. ‘Attacks on “Time-of-Flight” Distance Bounding Channels’. Proceedings of First ACM Conference on Wireless, Network Security (WISEC’08), pp. 194–202, March 2008.

    Google Scholar 

  12. J. Clulow, G.P. Hancke, M.G. Kuhn, T. Moore. ‘So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4357, pp. 83–97, September 2006.

    Google Scholar 

  13. S. Brands and D. Chaum. ‘Distance Bounding Protocols’. Proceedings of Advances in Cryptology (EUROCYPT ’93), Springer-Verlag LNCS 765, pp 344–359, May 1993.

    Google Scholar 

  14. S. Čapkun and J-P. Hubaux. ‘Secure Positioning in Wireless Networks’. IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 221–232, February 2006.

    Google Scholar 

  15. A. Harter, A. Hopper, P. Steggles, A. Ward and Paul Webster. ‘The Anatomy of a Context-Aware Application’. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM’99, pp. 59–68, August 1999.

    Google Scholar 

  16. Z. Li, W. Trappe, Y. Zhang and B. Nath., ‘Robust Statistical Methods for Securing Wireless Localization in Sensor Networks’. Proceedings of the International Symposium on Information Processing in Sensor Networks, 2005.

    Google Scholar 

  17. L. Lazos and R. Poovendran. ‘SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks’ Proceedings of the 3rd ACM workshop on Wireless, Security, pp. 21–30, 2004.

    Google Scholar 

  18. L. Lazos and R. Poovendran, ‘Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks’. IEEE Journal on Selected Areas of, Communication, Vol. 24, No., pp. 233246. February 2006.

    Google Scholar 

  19. A. Alkassar, C. Stuble and A. Sadeghi. ‘Secure Object Identification: or Solving the Chess Grandmaster Problem’. Proceedings of New Security Paradigms, Workshop, pp. 77–85, 2003.

    Google Scholar 

  20. K.B. Rasmussen and S. Čapkun. ‘Implications of Radio Fingerprinting on the Security of Sensor Networks’. Proceedings of IEEE SecureComm, 2007.

    Google Scholar 

  21. B. Danev, T.S. Heydt-Benjamin and Srdjan Capkun. ‘Physical-layer Identification of RFID Devices’, Proceedings of USENIX Security Symposium, 2009.

    Google Scholar 

  22. B. Danev and S. Capkun. ‘Transient-based Identification of Wireless Sensor Nodes’. Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2009.

    Google Scholar 

  23. G. DeJean and D. Kirovski. ‘RF-DNA: Radio-Frequency Certificates of Authenticity’. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), Springer-Verlag LNCS 4727, pp. 346–363, September 2007.

    Google Scholar 

  24. M.G. Kuhn. ‘An Asymmetric Security Mechanism for Navigation Signals’. 6th Information Hiding Workshop, Springer-Verlag LNCS 3200, pp 239–252, May 2004.

    Google Scholar 

  25. P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun and J-P Hubaux. ‘Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking’. IEEE Communications Magazine, February 2008.

    Google Scholar 

  26. N.O. Tippenhauer and S. Capkun. ‘ID-based Secure Distance Bounding and Localization’. Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009.

    Google Scholar 

  27. G.P. Hancke and M.G. Kuhn. ‘An RFID Distance Bounding Protocol’. Proceedings of IEEE/CreateNet SecureComm, pp. 67–73, September 2005.

    Google Scholar 

  28. J. Reid, J.M.G Nieto, T. Tang and B. Senadji. ‘Detecting Relay Attacks with Timing-Based Protocols’. Proceeding 2nd ACM Symposium on Information, Computer and Communications, Security, pp. 204–213, March 2007.

    Google Scholar 

  29. D. Singelée, B. Preneel. ‘Distance Bounding in Noisy Environments’. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4572, pp. 101–115, 2007.

    Google Scholar 

  30. Drone Hijacking? Thats Just the Start of GPS Troubles. Wired.com, July 2012. http://www.wired.com/dangerroom/2012/07/drone-hijacking/all/

  31. Vulneribility Assessment of the Transportation Infrastructure Relying on the Global Positioning System. John A. Volpe National Transportation Systems Center, 2001.

    Google Scholar 

  32. Global Navigation Space Systems: Reliance and Vulnerabilities, Royal Academy of Engineering, March 2011.

    Google Scholar 

  33. GNU Radio http://gnuradio.org

  34. Ettus http://www.ettus.com

  35. N.O. Tippenhauer, C. Popper, K.B. Rasmussen and S. Capkun. ‘On the Requirements for Successful GPS Spoofing Attacks’. Proceedings of ACM Communication and Computer Security (CCS), October 2011.

    Google Scholar 

  36. T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O’Hanlon and P.M. Kintner. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of GNSS Conference, September 2008.

    Google Scholar 

  37. Military jamming of GPS in Scotland suspended. BBC, October 2011. http://www.bbc.co.uk/news/uk-scotland-highlands-islands-15242835

  38. GPS Jamming: No Jam Tomorrow. The Economist, March 2011.

    Google Scholar 

  39. Galileo System Overview, European Space Agency. http://www.esa.int/esaNA/galileo.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. P. Hancke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Hancke, G.P. (2014). Security of Embedded Location Systems. In: Markantonakis, K., Mayes, K. (eds) Secure Smart Embedded Devices, Platforms and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7915-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7915-4_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7914-7

  • Online ISBN: 978-1-4614-7915-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics