Securing Wireless Localization: Living with Bad Guys

Li Zang,Yanyong Zhang,Wade Trappe,Badri Nath
2004-01-01
Abstract:The infrastructure provided by wireless networks promises to have a significant impact on the way computing is performed. Not only will information be available while we are on the go, but new locationaware computing paradigms along with location-sensitive security policies will emerge. Already, many techniques have emerged to provide the ability to localize a communicating device [?], [1]–[4]. Enforcement of location-aware security policies (e.g., this laptop should not be taken out of this building, or this file should not be opened outside of a secure room) requires trusted location information. As more of these location-dependent services get deployed, the very mechanisms that provide location information will become the target of misuse and attacks. Therefore, as we move forward with deploying wireless systems that support location services, it is prudent to integrate security into the protection of localization techniques. The purpose of this paper is to examine the problem of secure localization from a viewpoint different from traditional network security services. In addition to the different attacks and misuse faced by wireless localization mechanisms, it is our viewpoint that these vulnerabilities can be mitigated by exploiting the redundancy present in typical wireless deployments. Rather than introducing countermeasures for every possible attack, our approach is to provide localization-specific, attack-tolerant mechanisms that shield the localization infrastructure from threats that bypass traditional security defenses. The idea is to live with bad nodes rather than eliminate all possible bad nodes.
What problem does this paper attempt to address?