26 research outputs found

    An autonomous GNSS anti-spoofing technique

    Get PDF
    open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals. Several proposed solutions make uses of cryptography to protect against spoofing. A limitation of cryptographic techniques is that they introduce a communication and processing computation overhead and may impact the performance in terms of availability and continuity for GNSS users. This paper introduces autonomous non cryptographic antispoofing mechanisms, that exploit semi-codeless receiver techniques to detect spoofing for signals with a component making use of spreading code encryption.openCaparra, Gianluca; Wullems, Christian; Ioannides, Rigas T.Caparra, Gianluca; Wullems, Christian; Ioannides, Rigas T

    CREDIT CARD FORGERY IDENTIFICATION SYSTEM WITH LOCATION BASED TRACKING USING MOBILES WITH GPS

    Get PDF
    In Mobile networks the user’s location, passwords might be used as authentication factor to provide security services for remote client authentication. In addition there are many typical authentication factors. In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user. In LRAP, the user’s location can be determined by a third party used by user’s mobile for secure payment operations. This paper is to investigate a systematic approach to generate an encrypted data to real user mobile number along with decrypting key as SMS only when the location of credit card matches with the location of user’s mobile in order to avoid unauthorized access of credit card

    Guaranteeing the authenticity of location information

    Get PDF
    A comprehensive definition of location authentication and a review of its threats and possible solutions help provide a better understanding of this young security requirement.Publicad

    Capture of UAVs through GPS spoofing using low-cost SDR platforms

    Get PDF
    The increased use of unmanned aerial vehicles (UAVs), better known as drones, by civilians has grown exponentially and their autonomous flight control systems have improved significantly, which has resulted in a greater number of accidents and dangerous situations. To help resolve this problem, in this paper, we address the use of low-cost Software Defined Radio (SDR) platforms for simulating a global navigation satellite system (GNSS), more specifically the global positioning system (GPS), in order to transmit false signals and induce a location error on the targeted GPS receiver. Using this approach, a defensive system can be implemented which can divert, or even take control of unauthorized UAVs whose flight path depends on the information obtained by the GPS system.info:eu-repo/semantics/acceptedVersio

    Securing Localization With Hidden and Mobile Base Stations

    Get PDF
    Abstract — Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed that aim to detect and prevent attacks on localization systems. In this work, we propose a new approach to secure localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructurecentric localization schemes. We further show how this approach can be applied to secure localization in sensor networks. I

    SNAP: An authentication concept for the Galileo open service

    Get PDF
    The design of a solution for the authentication of both navigation data bits and spreading code chips, referred to as SNAP and suitable for the evolution of the Galileo E1 OS signal, is presented in the paper. Though the technique is innovative and able to achieve predefined authentication performance, it exploits the structure of the legacy Galileo signal and the characteristics of the OS NMA. A detailed overview of the open choices for the design of signal components dedicated to authentication is provided, together with an analysis of signal parameters definition. A possible implementation option of the SNAP solution is also presented

    A context‐aware approach to defend against unauthorized reading and relay attacks in RFID systems

    Full text link
    Radio frequency identification (RFID) systems are becoming increasingly ubiquitous in both public and private domains. However, because of the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise because of the tag's promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading . Promiscuous tag response also incites different forms of relay attacks whereby a malicious colluding pair, relaying messages between a tag and a reader, can successfully impersonate the tag without actually possessing it. Because of the increasing ubiquity of RFID devices, there is a pressing need for the development of security primitives and protocols to defeat unauthorized reading and relay attacks. However, currently deployed or proposed solutions often fail to satisfy the constraints and requirements of the underlying RFID applications in terms of (one or more of) efficiency, security, and usability. This paper proposes a novel research direction, one that utilizes sensing technologies, to tackle the problems of unauthorized reading and relay attacks with a goal of reconciling the requirements of efficiency, security, and usability. The premise of the proposed work is based on a current technological advancement that enables many RFID tags with low‐cost sensing capabilities. The on‐board tag sensors will be used to acquire useful contextual information about the tag's environment (or its owner, or the tag itself). For defense against unauthorized reading and relay attacks, such context information can be leveraged in two ways. First, contextual information can be used to design context‐aware selective unlocking mechanisms so that tags can selectively respond to reader interrogations and thus minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information can be used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers. Copyright © 2011 John Wiley & Sons, Ltd. This paper proposes a novel research direction, one that utilizes sensing technologies to tackle the challenging problems of unauthorized reading and relay attacks in radio frequency identification systems. First, contextual information is used to design context‐aware selective unlocking mechanisms, so that tags can selectively respond to reader interrogations and, thus, minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information is used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/109577/1/sec404.pd

    Secure positioning in wireless networks

    Get PDF
    So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations

    Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services

    Full text link
    corecore