Location Proof via Passive RFID Tags

  • Harry Gao
  • Robert Michael Lewis
  • Qun Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7405)

Abstract

With the surge in location-aware applications and prevalence of RFID tags comes a demand for providing location proof service with minimal cost. We introduce two protocols that provide secure and accurate location proof service using passive RFID tags. Both protocols are lightweight, adaptive and cost-effective. The first protocol assumes the connection of a user to the remote server. The second protocol does not require real time interactions with the server. Instead, it uses the self-reported time of local RFID reader (such as a cell phone), which may be biased. The user can upload the information to the server later to obtain the location proof. The paper presents a solution to derive users’ actual time of presence in the absence of a reliable clock, assuming an arbitrarily large number of falsified data points from malicious users.

Keywords

Wireless Sensor Network Elliptic Curve Cryptography Malicious User Isotonic Regression Real Time Interaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bai, X., Zhang, C., Xuan, D., Teng, J., Jia, W.: Low-connectivity and full-coverage three dimensional wireless sensor networks. In: Mobihoc, pp. 145–154 (2009)Google Scholar
  2. 2.
    Best, M.J., Chakravarti, N.: Active set algorithms for isotonic regression: A unifying framework. Mathematical Programming 47(1–3), 425–439 (1990)MathSciNetMATHCrossRefGoogle Scholar
  3. 3.
    Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: SEC, pp. 223–238 (2005)Google Scholar
  4. 4.
    Chiang, J.T., Haas, J.J., Hu, Y.-C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 181–192. ACM, New York (2009)CrossRefGoogle Scholar
  5. 5.
    Ding, M., Liu, F., Thaeler, A., Chen, D., Cheng, X.: Fault-tolerant target localization in sensor networks. EURASIP Journal on Wireless Communications and Networking 2007(1), 19–19 (2007)CrossRefGoogle Scholar
  6. 6.
    Gu, W., Bai, X., Chellappan, S., Xuan, D.: Network decoupling for secure communications in wireless sensor networks. In: 14th IEEE International Workshop on Quality of Service, IWQoS 2006, pp. 189–198. IEEE (2006)Google Scholar
  7. 7.
    Han, H., Sheng, B., Tan, C.C., Li, Q., Mao, W., Lu, S.: Counting RFID tags efficiently and anonymously. In: IEEE Infocom, San Diego, CA (March 2010)Google Scholar
  8. 8.
    Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM 2005, pp. 67–73. IEEE Computer Society, Washington, DC (2005)Google Scholar
  9. 9.
    Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: GIS, pp. 23–32 (2010)Google Scholar
  10. 10.
    Ren, S., Li, Q., Wang, H., Chen, X., Zhang, X.: Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. In: de Meer, H., Bhatti, N. (eds.) IWQoS 2005. LNCS, vol. 3552, pp. 107–122. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of the 10th workshop on Mobile Computing Systems and Applications, HotMobile 2009, pp. 3:1–3:6. ACM, New York (2009)Google Scholar
  12. 12.
    Stojmenovic, I., Liu, D., Jia, X.: A scalable quorum based location service in ad hoc and sensor networks. Int. J. Commun. Netw. Distrib. Syst. 1, 71–94 (2008)CrossRefGoogle Scholar
  13. 13.
    Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: IEEE ICDCS, Beijing, China, pp. 295–302 (June 2008)Google Scholar
  14. 14.
    Wang, H., Sheng, B., Tan, C.C., Li, Q.: WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA (2007)Google Scholar
  15. 15.
    Wang, H., Tan, C.C., Li, Q.: Snoogle: A search engine for physical world. In: IEEE Infocom, Phoenix, AZ, pp. 1382–1390 (April 2008)Google Scholar
  16. 16.
    Xie, L., Sheng, B., Tan, C.C., Li, Q., Chen, D.: Efficient tag identification in mobile RFID systems. In: IEEE Infocom, San Diego, CA (March 2010)Google Scholar
  17. 17.
    Xing, K., Ding, M., Cheng, X., Rotenstreich, S.: Safety warning based on highway sensor networks. In: Wireless Communications and Networking Conference, vol. 4, pp. 2355–2361. IEEE (2005)Google Scholar
  18. 18.
    Zhu, Z., Cao, G.: Applaus: A privacy-preserving location proof updating system for location-based services. In: INFOCOM, pp. 1889–1897 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Harry Gao
    • 1
  • Robert Michael Lewis
    • 1
  • Qun Li
    • 1
  1. 1.The College of William and MaryUSA

Personalised recommendations