120 likes | 229 Views
Location Measurements. Target. Martin Thomson, IETF-77 draft- thomson-geopriv-held-measurements. Device. Location Generator. Location Server. Rule Maker. Location Recipient. Geopriv /Internet Location. Options for positioning are limited in the current architecture
E N D
Location Measurements Target Martin Thomson, IETF-77 draft-thomson-geopriv-held-measurements Device Location Generator Location Server Rule Maker Location Recipient
Geopriv/Internet Location • Options for positioning are limited in the current architecture • HELD, DHCP provide purely network-based positioning • Wiremap tracing • Network based timing • Device-based positioning is purely autonomous • GPS • User-provided location
Co-operative Positioning Access Network Location Generator Device The LG has knowledge of the network topology The Device can take measurements The LG can retrieve information from the network Cooperation between LIS/LG and Device enables more positioning options: A-GPS, radio timing (RTT, TDOA), radio camera
Security Problems • Using measurements to: • gain someone else’s location • extract information about network topology • indirectly spoof location
Problem A:Get Someone Else’s Location • Attacker somehow gets measurements for a victim • The LIS authorizes a request based on identity • The LIS does not check that the measurement is valid and produces the victim’s location • Limitations: in most cases, it’s quite hard to get measurements for someone else • This is easy only if you know the victim’s location • Additional measures might be necessary for some cases • e.g. LLDP exposes information that might be used
Problem B:Network Topology Mapping • Based on the previous method • By repeatedly guessing measurements an attacker might acquire a map of the network • Matching measurements to locations • Determining network coverage and other potentially sensitive information • Limited by the same mechanisms • Place a rate limit on requests from clients
Problem C:Lying by Proxy • It’s one thing to lie about your location • It’s another thing entirely to get someone else to do your lying for you • Measurements can be spoofed to coerce a LIS/LG to provide a falsified location • Any credibility granted to the LIS/LG above that of the Device is thereby gained • It’s straightforward to spoof measurements
Option 1:“We don’t need no water…” • Existing location systems are trivially spoofed…and no one seems to care • Location information is largely produced for ultimate use by Targets (navigation, etc…) • There is no gain in spoofing for these applications • These systems aren’t a fair comparison • A number of factors limit the feasibility of spoofing in existing systems • Locked hardware, difficulty of implementation, advanced knowledge, limited and controlled device deployments • The Internet community is resourceful enough to overcome these inconveniences
Option 2:Check your inputs • Measurements can be checked • Just as we have mandated for identifiers • Works for A, B, and C • Doesn’t work for all types of measurements • A network-based location service cannot check every type of measurement • Would invalidate many methods • …and severely constrain others
Option 3:Sanity check outputs LG determined location Bad: outside uncertainty Probably ok Compare the result of using measurements with an independently obtained location It’s only possible to get a more accurate result if you can tolerate some uncertainty Limits scope of attacks, doesn’t prevent them
Option 4:Assign blame • Make it clear when location information is based on information that wasn’t checked • Create new labels for PIDF-LO that identify the nature of the source (LIS/Device/Other) • Could be used to address shortcomings of the previous option • Could also include verified data that is appropriately labelled • Decisions on trust are handled by recipients • Recipients exercise option 1 at their discretion • More accurate location is available
Actions Device Location Generator • draft-thomson-geopriv-held-measurements • Describes one protocol mechanism for exchanging measurements • A framework for providing measurements • Aside from the problem presented today • The set of measurements and the protocol interactions need definition • Is this work headed in the right direction?