>Dorothy Denning wrote an interesting paper on authenticating location using
>GPS signals... I think it's reachable from her home page as well as the
>following citation:
>
>D. E. Denning and P. F. MacDoran, "Location-Based Authentication: Grounding
>Cyberspace for Better Security," Computer Fraud and Security, Feb. 1996
>
>Ian :)

The article, at 
http://www.cs.georgetown.edu/~denning/infosec/Grounding.txt, 
describes a commercial product from International Series Research, 
Inc.  of Boulder, Colorado  called CyberLocator, for achieving
location-based authentication.  But it is short on details. 
Apparently a user to be authenticated sends a received GPS signal 
"signature" to the host which has its own GPS receiver and compares 
the signature with the GPS signal it received. The scheme took 
advantage of selective availability to some extent. I wonder if it 
being turned off has hurt them.The company has a white paper on 
CyberLocater: http://www.CyberLocator.com/WP_LBA.doc It is not clear 
if they have a shippable product yet.

Their scheme does not seem directly applicable to the problem of 
getting authenticated time from GPS since they assume a trusted host 
site. Also, if GPS had authentication features built into the 
unencrypted signals, I think they would have taken advantage of those 
features and mentioned them.

I can think of some non-cryptographic ways to authenticate GPS time. 
One way would be to use an electronically steerable antenna and track 
the satellites. A related approach might be to use two or more GPS 
receivers connected to directional antennas pointing in different 
directions. Given knowledge of the satellites orbits, it should be 
possible to predict the variations in received signal strength during 
each orbital pass. The antennas could be concealed in an RF 
transparent enclosure, preventing an attacker from knowing their 
orientation.

A third technique might be to use one or more local clocks. The 
various PC clocks on a network might do. Any attack other than a a 
very slow time drift would trigger an alarm.

A fourth might be to use several GPS receivers scattered around a 
building, campus or city.  Creating a spoof that produced the correct 
location for all the receivers might be hard.

Arnold Reinhold



Reply via email to