Robust Location Tag Generation from Noisy Location Data for Security Applications
نویسندگان
چکیده
Location-based security service provides authorization of persons or facilities based on their distinctive location information. It applies the field of position navigation and time (PNT) to the provision of security. Location parameters from radio navigation signals are mapped into a location verification tag or geotag to block or allow certain actions or access. Loran and Wi-Fi are chosen as case studies because of their good properties that are beneficial to location-based security services. The achievable performance and the security of the system are determined by the quantity and quality of location features. By quantity, we mean the total number of different (independent) location dependent measurements available. By quality, we mean that amount of unique location dependent information and its consistency provided by each parameter that can be used to generate a robust location tag. It is desirable to have the parameters be relatively insensitivity to temporal changes which weaken the uniqueness of the information. As a result, repeatability and repeatable accuracy are the fundamental requirement for any location-based security service. In this paper we propose fuzzy extractor scheme to generate strong location tag from noisy location data. A fuzzy extractor is an algorithm that can reliably extract desired information from input, and is error tolerant in the sense that this information will be the same even if the input changes. We develop different constructions of fuzzy extractor for various parameter distance measures: Euclidean and Hamming metrics. A combination use of the constructions will produce a more robust location tag. In addition, we mathematically analyze the entropy loss of the fuzzy extractor and study how to choose optimal design parameters under the tradeoff.
منابع مشابه
Pattern Classification for Geotag Generation
Geo-security, or location-based security service, provides authorization of persons or facilities based on their distinctive location information. It applies the field of position navigation and time (PNT) to the provision of security. Location-dependent parameters from radio navigation signals are quantized to compute a location verification tag or “geotag” to block or allow accesses by users....
متن کاملReliable Location-Based Services from Radio Navigation Systems
Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C's high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag--with a sensitivity of about 20 meters--that is difficult to project to an exact location. A device can use our location tag to block or allow certain actio...
متن کاملPhysical Pseudo Random Function in Radio Frequency Sources for Security
There is tremendous market potential for location-based services (LBS), enabled by the rapid growth in the numbers of personal navigation devices and GPS-enabled mobile handsets. One of the major difficulties for LBS applications is accurate and reliable indoor positioning caused by the difficulty of acquiring and tracking GPS satellite signals in the absence of a clear unobstructed path betwee...
متن کاملAn RFID Unilateral Distance Bounding Protocol and Analysis Over a Noisy Channel
Abstract form of automatic identification systems used for humans and objects is radio frequency identification (RFID). Fast and almost error-free calculations have led to its wide application in many places. Distance Bounding (DB) protocols verify that the tag is within a certain distance form reader. This process can be done by measuring the round trip time for message exchange. These protoco...
متن کاملA Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards
Abstract. Radio-frequency identification (RFID) is an automatic identification technology. In recent years, more and more applications have been found for its use. However, there are still many security issues worth discussing. In this paper, we propose a mutual authentication scheme, which can solve problems such as privacy, replay attack, forward security, and user location privacy. In our sc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009