Oct 22, 2007 - 4, rue Jacques Monod, 91893 ORSAY Cedex (France) ..... Where Ss is the transmission power of the sender, Sr is the remaining power or ...
Yang Ren-er, Zheng Zhiwei, Tao Shun, Ding Shilei, Image Steganography ... Van Overtveldt Jeroen Doggen, Maarten Weyn and Jerry Bracke and Suprakash.
IPSs use the IMU sensors integrated in the devices to estimate the motion direction and ... such as gradient descent based quaternion derivation algorithm ..... of IMU and MARG orientation using a gradient descent al /nobr> gorithm,M in ç»¼å¹ ...
laborate”, e.g., a Bluetooth headset and a cellphone, a wire- less access ... tional
Bluetooth pairing or key exchange protocols based on “user- selected” ..... work
hub among devices simulating a broadcast channel. It. 3For N95 specs, see:.
Short-range wireless communication (based on technologies such as Bluetooth ... i.e., a set of wireless devices must be securely associated. One of the main ...
combinations may help solving the security session establishment between devices. ... to mutually authenticate, and secure their communications, whatever the ...
[email protected]. Mohammed Aseeri ..... fuzzy rules in Mamdani model running fuzzy controller part. The three inputs are StorageRoom, ...
May 7, 2015 - information and energy transmission, secure information trans- mission while .... wireless energy transfer in a multi-user MISO WIPT system,.
Dec 1, 2014 - 1 System model with illustration of the power transfer and information .... 2 Illustration of four types of PT-IT cycles. ...... Surveys Tuts., vol. 16, no.
secure wireless communication system is revealing its under- ... secret has two advantages. First .... slowly and dynamic secrets offer little entropy benefit (nor.
May 27, 2017 - alignment (PA)/beamforming, and random subcarrier selection. (RSCS) based on ..... [0, 2Ï] into N equidistant points. Thus, the form of N-points.
Universal Plug and Play (UPnP). Wireless UPnP is the appropriate technology for mobile devices that roam around, creating and partaking in ad-hoc networks ...
{wangyi, kapadia, bkrishna}@usc.edu. Abstract. We propose ... within some pre-defined area, each carrying a simple programmable embedded low-power wire-.
Mar 1, 2011 ... The Juniper Networks Logo, the Junos logo, and JunosE are ..... Configuring a
Secure Access Manual CA Certificate (NSM Procedure) . . . . . . . .
Oct 24, 2018 - Positioning for Disaster Relief Communication. Environment ..... Sustainability 2018, 10, 3857. 7 of 11 measurement performance as in open spaces while channels 1, 2 and 3 showed generally lower .... c 2018 by the authors.
attempt to increase robustness and cost-effectiveness. The use .... entry point. The doors and windows may be open or closed. ... This would be a useful criterion in a distributed server .... This takes place in a dedicated component that monitors ..
requests in the web server. However, this can be handled only at the web request level. Apache server cannot monitor the clusters at the workload level as Grid ...
Jul 8, 2011 - synthesized using 7.1 version of FPGA Advantage for HDL ... Wireless LAN, VHDL. ... Recently, the subject of mobile positioning in wireless.
In third generation (3G) wireless cellular networks, mobile multimedia services ...... assignment,â IEEE Transactions on Vehicular Technology, vol. 44, no. 3, pp.
Nearest Neighbors in Signal Space Algorithm. Quang Tran, Juki Wirawan Tantra, Chuan Heng Foh, Ah-Hwee Tan, Kin Choong Yow. School of Computer ...
doi:10.1155/2012/546021. Research Article ... Received 17 May 2012; Accepted 28 May 2012 ..... we will use G1 and Nexus One Android-based phones. For.
Enabling secure portable medical devices with. TI's MSP430⢠MCU and wireless technologies. Introduction. Developers an
map-matching algorithm to improve the accuracy and motivate further research in the area of large-scale map matching. Keywords: WiFi; Wireless Networks; ...
Apr 30, 2015 - This opens the door for applications where the robot can localize itself actively ...... In order to train the observation models, we must: (1) capture a number of ... map, we use an SLAM algorithm (simultaneous localization and ...
Mar 26, 2005 - 1. DEPARTMENT OF COMPUTER SCIENCE. UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN. Srdjan Čapkun and Jean-Pierre Hubaux.
INFOCOM 2005
Secure Positioning of Wireless Devices with Application to Sensor Networks Srdjan Čapkun and Jean-Pierre Hubaux EPFL, Switzerland
Presented by Ning Li March 26, 2005 NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
1
Outline Attacks against Position and Distance Estimation Distance Bounding Verifiable Multilateration SPINE: Secure Positioning In sensor NEtworks Conclusions
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
2
Security Vulnerabilities in Positioning Existing positioning techniques Global Positioning System (GPS) For outdoor positioning
Ultrasound (US) Operates by measuring time-of-flight (ToF) of sound signal
Radio (RF) Received Signal Strength (RSS) Time-of-Flight (ToF)
Attacker model External attacker: cannot authenticate itself Compromised node: controlled by attacker and can authenticate itself
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
3
Security Vulnerability (Cont.) Global Positioning System (GPS) Civilian GPS can be spoofed by GPS satellites simulators Military GPS are protected by encryption
Ultrasound (US)
u
v
Distance reduction: Attacker: uses a faster radio link Compromised node: lies about sending/receiving time
Distance enlargement: Attacker: jams and replays Compromised node: delays the response
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
4
Security Vulnerability (Cont.) Radio (RF) Received Signal Strength (RSS): Compromised node: false power strength report External attacker: jams and replays
Time-of-Flight (ToF): Compromised node: false power strength report External attacker: jams and replays, but only can enlarge the distance
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
5
Outline Attacks against Position and Distance Estimation Distance Bounding Verifiable Multilateration SPINE: Secure Positioning In sensor NEtworks Conclusions
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
2
Distance Bounding Protocol
u cannot pretend to be closer to v than what it really is. NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
6
Outline Attacks against Position and Distance Estimation Distance Bounding Verifiable Multilateration SPINE: Secure Positioning In sensor NEtworks Conclusions
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
2
Verifiable Multilateration VM relies on distance bounding measurements from at least three reference points (verifiers) to the considered device (the claimant). The claimant can only pretend that it is more distant from the verifier than it really is due to the distance bounding. If the claimant is within the triangle formed by verifiers, it cannot increase the measured distance to one or more verifiers without impairing the consistency of the position.
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
7
Verifiable Multilateration Protocol
The algorithm is executed by an authority. NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
8
Detection of Enlarged Distances
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
9
Properties of VM A node located at position p within the triangle formed by the verifiers cannot prove to be at another position p’≠ p within the same triangle. A node located outside the triangle formed by the verifiers cannot prove to be at any position p within the triangle. NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
10
Outline Attacks against Position and Distance Estimation Distance Bounding Verifiable Multilateration SPINE: Secure Positioning In sensor NEtworks Conclusions
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
2
SPINE: Secure Positioning In sensor NEtworks System Model Sensor nodes and landmarks Sensors can measure distance by ToF of radio signal Network is operated by a central authority Network nodes can establish pairwise secret keys.
Threats in sensor network positioning (Attacker-x-y means x compromised and y external nodes) Node physical displacement: Attacker-0-2 Wormhole attack: Attack-0-2 Malicious distance enlargement: Attack-0-1 Dissemination of false position and distance: Attack-1-0
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
11
Attacks on Sensor Network Positioning
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
12
SPINE Algorithm
1) Sensors measure distance bounds to their neighbors 2) Distance bounds are verified through verifiable multilateration 3) Positions of the nodes are computed with a distributed or centralized range-based positioning algorithm. NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
13
Basic Distance Verification (BDV)
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
14
BDV Triangle Forming
Verification triangles around u, with v and its neighbors Verification triangles around v, with u and its neighbors Verification triangles around u and v NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
15
BDV Verification 1) Nodes forming a triangle define a local coordinate system, in which they then compute the position of u or v (or both). 2) The computation of the position of u and v is performed with verifiable multilateration, through which the distance bounds dbuv and dbvu are then verified. 3) Verification of the distance bound is successful within BDV only if in all verification triangles the measured distance bounds dbuv and dbvu match the computed positions (with a tolerance of δ). NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
16
SPINE: Discussions The effectiveness of SPINE depends on the node density and the spatial distribution of landmarks. Landmarks should be specially placed on the boundaries.
NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
17
SPINE: Security Analysis
An external attacker or compromised node (v’) can launch a distance enlargement attack on a single triangle BDV. BDV of k disjoint triangles can resist up to 2k distance enlargement attacks. NING LI
DEPARTMENT OF COMPUTER SCIENCE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
18
Conclusions Most proposed positioning techniques are vulnerable to position spoofing attacks from external attackers and compromised nodes. Positioning and distance estimation techniques based on radio signal propagation exhibit the best properties for position verification. Verifiable Multilateration enables secure computation and verification of node positions in the presence of attackers. SPINE can resist against distance modification attacks from a large number of attacker nodes. NING LI