VerLoc: Verifiable Localization in Decentralized Systems

05/25/2021
by   Katharina Kohls, et al.
0

This paper tackles the challenge of reliably determining the geo-location of nodes in decentralized networks, considering adversarial settings and without depending on any trusted landmarks. In particular, we consider active adversaries that control a subset of nodes, announce false locations and strategically manipulate measurements. To address this problem we propose, implement and evaluate VerLoc, a system that allows verifying the claimed geo-locations of network nodes in a fully decentralized manner. VerLoc securely schedules roundtrip time (RTT) measurements between randomly chosen pairs of nodes. Trilateration is then applied to the set of measurements to verify claimed geo-locations. We evaluate VerLoc both with simulations and in the wild using a prototype implementation integrated in the Nym network (currently run by thousands of nodes). We find that VerLoc can localize nodes in the wild with a median error of 60km, and that in attack simulations it is capable of detecting and filtering out adversarial timing manipulations for network setups with up to 20

READ FULL TEXT

page 7

page 15

research
04/19/2018

Individual Security and Network Design with Malicious Nodes

Networks are beneficial to those being connected but can also be used as...
research
12/13/2019

RSSI-based Secure Localization in the Presence of Malicious Nodes in Sensor Networks

The ability of a sensor node to determine its location in a sensor netwo...
research
07/14/2021

Governing Decentralized Complex Queries Through a DAO

Recently, a new generation of P2P systems capable of addressing data int...
research
02/20/2018

Cobalt: BFT Governance in Open Networks

We present Cobalt, a novel atomic broadcast algorithm that works in netw...
research
09/02/2020

Decentralized Source Localization Using Wireless Sensor Networks from Noisy Data

In this paper, the source (event) localization problem is studied in dec...
research
06/13/2023

Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings

Short Message Service (SMS) remains one of the most popular communicatio...
research
06/09/2021

LTrack: Stealthy Tracking of Mobile Phones in LTE

We introduce LTrack, a new tracking attack on LTE that allows an attacke...

Please sign up or login with your details

Forgot password? Click here to reset