Professional Documents
Culture Documents
Tweedejaars Project Wiskunde
Tweedejaars Project Wiskunde
4
3
(d )
3
4
3
R
3
=
6d
2
+2
3
R
3
.
Notice that when the adversary is not positioned near the centre of the convex hull, part of the disc
of a certain distance from the adversary lies outside of the convex hull. Since no verier could
be positioned there, the chance of the hidden being located inside the disc would be smaller than
6d
2
+2
3
R
3
. Therefore, in order to compute the maximum chance of success for the adversary in the
above computation, we assumed that the adversary is positioned near the centre of the convex hull.
3.1. HIDDEN BASE MODEL 11
We see that the chance of success decreases when the localisation and ranging error decreases or
when the radius of the convex hull increases. Therefore the veriers can arrange their infrastruc-
ture in such a way that the chance of success for the adversaries becomes arbitrarily small. Hence,
this position-verication protocol is secure.
3.1.2 Locating a Hidden Verier
Now that we know that secure position-verication is possible when the location of one of the
veriers is unknown to the adversaries, the question arises if there is a way for the adversaries
to effectively and efciently determine the position of such a hidden verier. In this section a
protocol for determining the position of the hidden verier is constructed. For this method to
work, the following assumptions have to be made (Chandran et al., 2009):
The adversaries receive feedback on whether or not their position was accepted or rejected
by the veriers.
The method can be used O(log(
1
)). Because
the smaller the required precision, the higher the number of iterations required, we see that the
required number of iterations is O(log(
1
l
1
P
2
and
l
1
l
2
and to be the angle between the lines
l
2
P
1
and
l
2
P
1
. For simplicity, with A, B being points
in d-dimensional space, write AB for d(A, B). The calculation requires use of the Sine and Cosine
Rules.
3.1. HIDDEN BASE MODEL 13
Figure 3.1: Intersection of
i
and
j
(reproduced from Chandran et al. (2009))
Theorem 2 (Sine Rule). With angles and lengths as in Figure 3.2, for any triangle we have
a
sin
=
b
sin
=
c
sin
.
Theorem 3 (Cosine Rule). With angles and lengths as in Figure 3.2, for any triangle we have
a
2
= b
2
+c
2
2bccos,
b
2
= a
2
+c
2
2accos,
c
2
= a
2
+b
2
2abcos.
Figure 3.2: Triangle with marked angles and edges
Using the Cosine Rule we nd the following values, corresponding to the values in Figure 3.1.
y
2
= Q
2
l
2
2
+Q
1
l
2
2
2 Q
2
l
2
Q
1
l
2
cos,
z
2
= P
2
l
2
2
+P
1
l
2
2
2 P
2
l
2
P
1
l
2
cos.
3.2. MOBILE-BASE MODEL 14
We nd the values of the lengths in these equations using the Sine Rule.
Q
2
l
2
=
x sin( +)
sin( ( + +2))
=
x sin( +)
sin( + +2)
,
Q
1
l
2
=
x sin()
sin( ( +))
=
x sin()
sin( +)
,
P
2
l
2
=
x sin()
sin( ( + +))
=
x sin()
sin( + +)
,
P
1
l
2
=
x sin( +)
sin( ( + +))
=
x sin( +)
sin( + +)
.
Substituting these expressions into y
2
and z
2
yields
y
2
=
x sin( +)
sin( + +2)
2
+
x sin()
sin( +)
2
2
x sin( +)
sin( + +2)
x sin()
sin( +)
cos,
z
2
=
x sin()
sin( + +)
2
+
x sin( +)
sin( + +)
2
2
x sin()
sin( + +)
x sin( +)
sin( + +)
cos.
Each step in Protocol 1, the areas of sectors
i
and
j
are divided into halves. Hence, with
each iteration, the angle is divided by two. We seek to nd a relationship between angle and
the lengths y and z in order to nd a relationship between angle and precision requirement .
Expanding the sine and cosine terms to rst order Taylor only series yields
y
2
=
2
x
2
()
2
+
x
2
( +)
2
( + +2)
2
2x
2
( +)
( +)( + +2)
=
2
x
2
( )
2
( +)
2
( + +2)
2
,
z
2
=
2
x
2
( + +)
2
+
x
2
( +)
2
( + +)
2
2x
2
( +)
( + +)
2
=
2
x
2
( + +)
2
.
Clearly, both y and z have a polynomial relationship with .
Consider precision requirement . Because the relationship of y and z with is polynomial and
the relationship of y and z with too, the relationship between and is polynomial. For any pre-
cision requirement , a certain number of iterations of Protocol 1 is required. The smaller , the
more iterations. Hence, the required amount of iterations depends on
1
(+R
/
R)
2
R
2
R
/
2
2 R R
/
.
Giving this upper bound one can see in Figure 3.4 that the number of adversaries must be always
more or equal to k = 2/2 = /.
Probability of Spoong Position P
Now we know how many adversaries we need to let the MBS believe that someone is positioned
at position P, we also want to know how big the chance that we achieve this. This is the chance
that for each adversary A
i
the MBS is in sector L
i
A
i
R
i
, the "good area" and not in the "bad area"
A
i1
L
i
A
i
in where adversary A
i
cannot spoof position P (see Figure 3.4 and the detailed version in
Figure 3.8). This chance is determined by dividing the size r
good
of the good area by the size r
total
of the total area =
r
good
r
total
, where the size of the total area is the size of the good area plus the size
r
bad
of the bad area.
Figure 3.8: Detailed version of Figure 3.4 with good area L
i
A
i
R
i
and bad area A
i1
L
i
A
i
.
The area A of a circle sector with radius R and angle is A =
r
2
2
. As one can see in Figure 3.4
and Figure 3.8 the total area r
total
for a single adversary A
i
is the surface of the area A
i1
L
i
A
i
plus
area L
i
A
i
R
i
. This is the same as the sector L
i
PR
i
with radius R
/
minus the same sector L
i
PR
i
with
3.2. MOBILE-BASE MODEL 20
radius R. So the size of the total area is
r
total
=
R
/
2
2
/
2
R
2
2
/
2
=
(R
/
2
R
2
)2
/
2
= (R
/
2
R
2
)
/
.
Now instead of looking at the good area we can also look at the "bad area" A
i1
L
i
A
i
that the MBS
may not enter if the adversaries successfully want to spoof position P, since =
r
good
r
total
= 1
r
bad
r
total
.
We want to know the size r
bad
of the bad area A
i1
L
i
A
i
. Herefore we look at the surface of triangle
A
i1
L
i
A
i
with as height the distance from A
i,i1
to L
i
a and as a base the straight line A
i1
A
i
between A
i1
and A
i
(see Figure 3.8).
The height h
A
i1
L
i
A
i
of triangle A
i1
L
i
A
i
is R
/
R plus the height of the circular segment,
which is the part of triangle A
i1
L
i
A
i
inside the disk with radius R and centre P. The height
h
A
of a circular segment A with radius R and angle is h
A
= R(1 cos(/2)). So the height
h
cseg(A
i1
L
i
A
i
)
of the circular segment with radius R and angle 2
/
inside triangle A
i1
L
i
A
i
is
h
cseg(A
i1
L
i
A
i
)
= R(1cos
2
/
2
) = R(1cos
/
). Now, the height h
A
i1
L
i
A
i
of triangle A
i1
L
i
A
i
is
h
A
i1
L
i
A
i
= R
/
R+h
cseg(A
i1
L
i
A
i
)
= R
/
R+R(1cos
/
)
= R
/
+Rcos
/
.
The length of base A
i1
A
i
is twice the opposite site of
/
in the triangle A
i,i1
PA
i
, where A
i,i1
is the position in the middle of A
i1
A
i
(see Figure 3.8). So
A
i1
A
i
= 2 R sin
/
.
Since the size of a triangle is
baseheight
2
, the size r
A
i1
L
i
A
i
of the triangle A
i1
L
i
A
i
is:
r
A
i1
L
i
A
i
=
2 R sin
/
(R
/
R cos
/
)
2
= R sin
/
(R
/
R cos
/
).
To determine the size r
bad
of the bad area A
i1
L
i
A
i
we need to subtract the size of triangle
A
i1
L
i
A
i
inside the disk with radius R from the size of triangle A
i1
L
i
A
i
(see Figure 3.8).
This is the circular segment with radius R and angle 2
/
. The size r
cseg
of a circular segment is the
area of the circle sector minus the area of the triangular portion, so
r
cseg
=
R
2
2
(2
/
sin(2
/
)).
3.3. MORE ALTERED MODELS 21
So the size r
bad
of the bad area A
i1
L
i
A
i
is
r
bad
= r
A
i1
L
i
A
i
r
cseg
= R sin
/
(R
/
R cos
/
)
R
2
2
(2
/
sin(2
/
),
and the chance of spoong position P successfully is
=
r
good
r
total
= 1
r
bad
r
total
= 1
R sin
/
(R
/
R cos
/
)
R
2
2
(2
/
sin(2
/
)
(R
/
2
R
2
)
/
=
R R
/
sin
/
/
R
/
2
(R
/
2
R
2
)
/
.
If we have k MBS then the chance of spoong P successfully is the chance that all the adversaries
stay in the good area. So this chance is simply
k
.
3.3 More Altered Models
So we have looked at two obvious alterations on the basic insecure Vanilla model; the Hidden-
Base Model and the Mobile-Base Model. It has been show that secure positioning is not possible
with these alternative models, but there could be other alterations of the Vanilla Model that might
make secure positioning possible. Although we do not review other models in this article, there are
some that might be interesting to research. Three of these other alterations on the Vanilla model
are:
The Bounded-Retrieval Model. In this model, the amount of information adversaries can
receive and store is limited. The existence of this alteration is plausible since in some
situations veriers can sent a big amount of information at a very high speed, by which
adversaries can only receive a constant fraction of it. This, for example, happens when
veriers have several sources where they broadcast there information and when they also
broadcast it at different frequencies. Chandran et al. (2009) have shown that there exist a
protocol in this model that is secure against any attack by adversaries. However, previous
papers have said the same about the Hidden-Base Model and Mobile-Base Model, but we
have seen that this is not the case. If someone could come up with an attack build on the
same assumptions as the position-verication protocols of the veriers, then the Bounded-
Retrieval model is unsafe as well.
Quantum-information. Since in the attacks on the Vanilla Model, the Hidden-Base Model
and the Moving-Base Model adversaries intercept the information sent by the veriers, hold
it and then forward it to the other adversaries an obvious alteration could be the use of
quantum-information. This, because deforming quantum-information changes the informa-
tion itself, so veriers could see it if it has been intercept by adversaries. It has however
already been shown by Buhrman et al. (2014) that even with quantum-information secure
3.3. MORE ALTERED MODELS 22
positioning is not possible.
The Noisy-Channel Model. Another alteration is to make use of so called "noisy channels".
In this model the information gets slightly altered by the input of random bits sent by noisy
channels. As a result, adversaries do not know what the exact message is so they may not
be able to successfully execute an attack on a position-verication protocol executed by the
adversaries.
Chapter 4
Model Evaluation
In this chapter the security of position-verication in the different models discussed in previous
chapters is evaluated with an emphasis on applicability. Following Chapter 3, rst the Hidden-
Base Model (HMB) en then the Mobile-Base Model (MBM) are reviewed.
4.1 Security in the Hidden-Base Model
We have seen that secure position-verication is possible when the location of one or more of
the veriers is unknown to the adversaries. Recall the chance of success for the adversaries is
P(d d
A
d +) =
6d
2
+2
3
R
3
. Note that none of the variables depend on the adversary.
Therefore, future improved adversary computers will not be able to achieve higher chances of suc-
cessfully fooling the veriers. Moreover the localisation and ranging error positively relates to
P(d d
A
d +). Therefore, future improved localisation and ranging hardware that allow
for smaller will decrease the adversaries chance of success. This error is discussed more in
Section 4.3.
The security proof of Capkun et al. relies on the hidden verier remaining hidden. Hence, the
protocol constructed by Chandran et al. for locating a hidden verier poses a fatal problem. At
most O(log(
1
)) attempts are needed to locate any hidden verier (Chandran et al., 2009). When
all veriers are located, the adversaries can successfully fool the veriers in the way described in
the impossibility proof of Section 2.2.
A possible way for the veriers to prevent the successful localisation of some or all hidden veriers
is to allow only a predetermined number of attempts to connect to the verication infrastructure by
any device. This predetermined number of attempts has to be signicantly smaller than O(log(
1
)).
Such a limitation on the infrastructure would impose problems on the applicability of this protocol:
1. When individual devices are limited in their number of attempts to connect to the verication
infrastructure, multiple adversaries can work together to locate a hidden verier if their
added number of allowed attempts reaches O(log(
1
)).
2. When the limitation of attempts is enforced on more devices combined, any honest device
is retained from connecting to the verication infrastructure if adversaries, intentionally or
not, attempt to connect more often than allowed. Though this does not render the position-
verication protocol insecure, it does make it impractical for applications.
4.2. SECURITY IN THE MOBILE-BASE MODEL 24
4.2 Security in the Mobile-Base Model
In Section 3.2 we have seen an other way of trying to determine if someone is at a given position P
by using moving veriers, called Mobile-Base Stations (MBS). We also have seen that adversaries
can still carry out an attack to let these MBS believe that someone is at position P even when he is
not. In this section we are going to look at the applicability of this attack. Is it realistic to say that
adversaries can easily spoof position P when they apply their attack as described in Section 3.2?
There are two obstacles which could prevent adversaries from successfully spoong position P:
The number of adversaries needed could be too high for practical implementations. Since
the response signal from the adversaries has to arrive at the MBS within the error bound ,
the number of adversaries needed to achieve this when the error bound is small could be
very high.
The adversaries could have a lowchance of success because the area in where the adversaries
cannot spoof position P is too large compared to the area in where they can spoof position
P.
Assume that the disk where the MBS are has a radius R
/
=500m, the disk that we assume the MBS
will not enter has a radius of R = 50m and the MBS have an error bound of = 2.5m.
Let us assume that the MBS is in the area in where adversaries can spoof position P. We need to
have enough adversaries such that the delay of the signal broadcast back by the adversaries arrives
at the MBS within the error bound . As shown in Section 3.2, we need to have k =
adversaries
to achieve this, where , the upper-bound of the angle
/
, is
cos
1
(+R
/
R)
2
R
2
R
/
2
2 R R
/
.
If R
/
= 500m, R
/
= 50m and = 2.5m we need to have k = 11 adversaries to stay within the error
bound = 2.5m, since:
cos
1
(2.5+50050)
2
50
2
500
2
2 50 500
= cos
1
47743.75
50000
10.418
.
So if we take upper bound for
/
to be
10.418
, then number of adversaries is k = / =
/
10.418
10.4. So we need 11 adversaries.
Now assume we have 11 adversaries, i.e. that the response signal from the adversaries always
arrives at the MBS within the error bound = 2.5, but we do not know if the MBS are in the area
in where the adversaries can pretend that the prover is at position P (the "good area"). Recall that
the chance that an MBS is in the good area, and thus that the adversaries can successfully spoof
position P, is
=
R R
/
sin
/
/
R
/
2
(R
/
2
R
2
)
/
.
4.2. SECURITY IN THE MOBILE-BASE MODEL 25
And if we have k MBS than the chance of success is
k
. In this example where we have R
/
=500m,
R
/
= 50m and = 2.5m (and 11 adversaries) this chance is for a single MBS
=
500 50 sin(
10.418
)
10.418
500
2
(500
2
50
2
)
10.418
=
7425.19974251.993
74635.529
0.90.
So the chance of success against a single MBS is approximately 0.90. Even with 20 MBS
in the disk with radius R
/
= 500m, the adversaries still have a 0.12 chance of spoong position P.
If we want this chance to be below .01 we need 44 MBS. If we have R
/
= 2000m, R = 50m and
= 2.5m we still need 11 adversaries to stay within the error bound and our chance of success
with a single base station is approximately .98.
Chandran et al. (2009) have shown how the number of adversaries needed to successfully spoof P
depends on the sizes of R
/
, R and . Since only the ratios of these parameters to oneanother matter
and not the actual values, they have plotted two graphs with different values of these ratios (See
Figure 4.1 and Figure 4.2).
Figure 4.1: Graph by Chandran et al.
(2009) where the number of adversaries is
plotted as a function of with R = .5R
/
and = .01R
/
.
Figure 4.2: Graph by Chandran et al.
(2009) where the number of adversaries is
plotted as a function of with R = .1R
/
and = .01R
/
.
We see in both graphs that we do not need a lot of adversaries to stay within the error bound .
So the number of adversaries needed is not too high for practical implementations. Only when
the error bound is very small and the radius of R
/
compared to R
/
very big, then the number of
adversaries needed to stay within the error bound could become very big. So if in the future
improved hardware could make positioning possible with a very small , then secure positioning
might be possible.
Chandran et al. (2009) have also looked at the probability of successfully spoong P in the "worst
case scenario". Where they dened the worst case to be a very small error bound = .00001 for
a xed R/R
/
ratio, because then a large number of adversaries is needed to stay within the error
bound . But one can see in Figure 4.3 that even with this restrictions the worst case probability
4.3. INFLUENCE OF LOCALISATION AND RANGING ERROR 26
of success will still be very high (always bigger than 0.5).
Figure 4.3: Graph by Chandran et al. (2009) where the chance of success is given as a function
of the ratio R/R
/
with a very small error bound = .00001.
So the number of adversaries needed to stay within the error bound in the attack for the Mobile-
Base Station Model is very small and even the worst case probability of success is always very
high. Thus it is realistic that the attack described in Section 3.2 is easy to carry out and has a high
probability of success.
4.3 Inuence of Localisation and Ranging Error
As we have seen before, both in the Hidden Base Model and the Moving Base Model, the security
of position-verication protocols could increase with a decreased localisation and ranging error
. This error is taken into account in the rst place, because localisation and ranging hardware
is never completely accurate. However, in time this localisation and ranging hardware could im-
prove, allowing for smaller .
For the Moving Base Model, a smaller potentially improves the security of position-verication
protocols. This is because from a very small on, the number of required aversaries would in-
crease fast, see Figures 4.1 to 4.2. If improved future hardware allows for a small enough,
position-verication protocols based on the Moving Base Station could be secure.
For the Hidden Base Model, a smaller doesnt necessarily improve the security of position-
verication protocols. When the limited number of attempts to connect to the verication infras-
tructure, discussed in Section 4.1, are implemented, a smaller improves the security. However
protocols using this implementation are not suited for application, as seen before. When unlimited
attempts to connect can be done by the adversaries, the security improvement caused by smaller
is not sufcient. This is because smaller in this case results in possibly smaller . As we have
shown in Section 3.1, the effort that the adversaries have to make to locate a hidden verier with
-precision relates to with O(log(
1