CPV: Delay-Based Location Verification for the Internet

CPV: Delay-Based Location Verification for the Internet

1 CPV: Delay-based Location Verification for the Internet AbdelRahman Abdou, Student Member, IEEE, Ashraf Matrawy, Senior Member, IEEE, and P.C. van Oorschot, Member, IEEE Abstract—The number of location-aware services over the Internet continues growing. Some of these require the client’s geographic location for security-sensitive applications. Examples include location-aware authentication, location-aware access policies, fraud prevention, complying with media licensing, and regulating online gambling/voting. An adversary can evade existing geolocation techniques, e.g., by faking GPS coordinates or employing a non-local IP address through proxy and virtual private networks. We devise Client Presence Verification (CPV), a delay-based verification technique designed to verify an assertion about a device’s presence inside a prescribed geographic region. CPV does not identify devices by their IP addresses. Rather, the device’s location is corroborated in a novel way by leveraging geometric properties of triangles, which prevents an adversary from manipulating measured delays. To achieve high accuracy, CPV mitigates Internet path asymmetry using a novel method to deduce one-way application-layer delays to/from the client’s participating device, and mines these delays for evidence supporting/refuting the asserted location. We evaluate CPV through detailed experiments on PlanetLab, exploring various factors that affect its efficacy, including the granularity of the verified location, and the verification time. Results highlight the potential of CPV for practical adoption. Index Terms—Location-aware Authentication; Location-based Services; Location-verification; Internet Measurements; Geolocation F 1 INTRODUCTION VER the Internet, Location-Sensitive Providers (LSPs) are where a geolocation service provider maintains tables that map O those that customize their content/services based on the IP addresses to locations—e.g., MaxMind [9], can be evaded geographic locations of their clients (the software that commu- through IP address-masking technologies [10] such as proxy nicates with the LSP, typically a web-browser). Some LSPs re- servers and anonymizers [11]. Geolocation that is based on strict their services to certain geographic regions, such as media active delay measurements [12], [13] is prone to an adver- streaming [2] (e.g., hulu.com); others limit certain operations to sary corrupting the delay-measuring process [14]. A location a specific location, such as online voting (e.g., placespeak.com), verification technique is therefore required to provide greater online gambling (e.g., ballytech.com), location-based social net- assurance of the veracity of the specified location. working [3] (e.g., foursquare.com), or fraud prevention (e.g., Various solutions have been proposed to verify location optimalpayments.com). LSPs may also use location informa- claims in wireless networks [15], [16]. However, solutions in tion as an additional authentication factor to thwart imper- this domain cannot be directly adopted by multi-hop networks, sonation and password-guessing attacks (e.g., facebook.com). e.g., the Internet, due to delay characteristics of different do- Privacy laws differ by jurisdiction, which allows/bans content mains. For example, Internet delays are stochastic [17], whereas based on region [4]. The nature of the provided services may in single-hop wireless networks, delays can be estimated from motivate clients to forge their location to gain unauthorized the distance the signal spans and the speed of its propagation. access. Verifying the location of Internet clients is a challenging Existing geolocation technologies, commonly used in prac- problem [5]. A practical approach must address critical chal- tice, are susceptible to evasion [5]. For example, the W3C lenges such as handling of IP address-masking, and ensuring geolocation API [6] defines an interface that allows the client’s the correctness of location information submitted by the client. web browser to determine and return the client’s location to We present and evaluate Client Presence Verification (CPV), a the requesting LSP. Browser vendors usually rely on common delay-based technique designed to verify a client’s geographic location-determination technologies, such as Global Position- location. Experimental results show that CPV can achieve a ing System (GPS) [7] or WiFi Positing System (WPS) [8]. granularity equivalent in area to a circle with radius ∼400km.1 Because the client sends its location to the LSP, it can submit CPV is designed to resist known geolocation-circumvention forged location information [3]. Tabulation-based techniques, tactics as it (1) does not rely on the client’s IP address, (2) does not rely on client-submitted information, and (3) is designed • A. Abdou is with the Department of Systems and Computer Engineering, such that manipulating the delays is not in the dishonest Carleton University. Email: [email protected] client’s favor. CPV takes as an input the client’s asserted • A. Matrawy is with the School of Information Technology, Carleton Univer- sity. Email: [email protected] location, and outputs a number between 0 and 1 (inclusive) • P.C. van Oorschot is with the School of Computer Science, Carleton Univer- representing its confidence of the asserted location. Under sity. Email: [email protected] appropriate calibration, the output can then be translated to Version created on: June 30, 2015. This work extends a preliminary version an accept/reject decision. presented at the IEEE conference on Communications and Network Security (CNS 2014) [1]. The final version of this paper will appear in the IEEE Transactions on Dependable and Secure Computing (TDSC). This is the authors’ copy for personal 1. The verification region is in fact a triangular, rather than a circular, one use. c 2015 IEEE. as we explain in x4. 2 A common challenge faced by delay-based geolocation [26], [19] including the spanned geographic distances, routing techniques is to find an accurate delay-to-distance mapping policies, etc. function, and thus factors affecting the correctness of this Delay-based IP geolocation includes a broad class of tech- mapping have been well studied in the literature [18], [19]. niques aiming to calculate the geographic location of a client CPV undertakes a set of measures to mitigate the effect of these based on the delays observed between the client and a set of factors. For example, it mitigates path asymmetry [20] by using landmarks with known locations [27]. Most techniques apply a novel protocol,2 to deduce one-way delays (OWDs) to/from regression analysis to find a function that best models the a potentially dishonest client. Additionally, CPV mitigates relationship between the measured delays and geographic dis- network instability [22] by iterating the delay-measurement tances [12], [17]. Multilateration is then used on the distances process. mapped between the landmarks and the client to constrain the We analyze the effect of several factors on the correctness region where the client is located. Recent techniques incur a of CPV by evaluating its false reject and false accept rates median error of as low as a few kilometres [12]. To infer dis- using PlanetLab [23]. For example, results show that the farther tances from delays, the speed at which packets are transmitted an adversary’s true location is from the asserted (fraudulent) over the Internet has been approximated to 4/9 the speed location, the more likely it is for CPV to correctly reject this of light in vacuum, a ratio called the Speed of the Internet assertion; CPV correctly rejected 97% (1,749 of 1,803) of fraud- (SOI) [28]. However, the actual speed is affected by several ulent location assertions that were >200km away from the factors such as time of the day, region and characteristics of the adversaries’ true locations. We then discuss how CPV mitigates underlying network. Based on 19 million RTT measurements in tactics that evade common geolocation techniques, and other the Internet, Landa et al. [19] found that the knowledge of the potential CPV-specific tactics. geographic distance between two nodes, their /8 IP prefixes, We make the following contributions: and their countries can help scope down delay-estimation errors to within ∼22ms. 1) Devising a novel protocol to estimate, at a given Network Coordinates Systems (NCSs) [29] model a net- time, the forward and reverse OWDs between two work as a geometric space by assigning coordinates to each hosts over the Internet (x5). The protocol can give node in the network. The coordinates denote a node’s position more accurate OWD estimates than half the round-trip relative to other nodes in the network delay space, i.e., according time (RTT), while requiring less cooperation between to its delay to/from them. One essential advantage of NCSs is the two hosts than commonly required by OWD- the ability to locate a node’s network position relative to almost estimation protocols [24]. all other nodes without overwhelming the network with storms 2) Presenting CPV, an approach for verifying location of delay sampling [30]. NCSs are vulnerable to an adversary assertions of clients over the Internet. CPV lever- falsifying its coordinates [31]. ages the OWD-estimation protocol noted above, and The aforementioned delay studies provide solid evidence uses heuristics that improve the accuracy of delay-to- of a strong correlation between Internet delays and geographic distance mapping. To the best of our knowledge, CPV distances [32], which is commonly speculated to stem from is the first algorithm that uses delays to verify (rather improved global network connectivity [27]. CPV leverages than determine) client locations over the Internet. these results to address location verification. 3) Evaluating CPV through detailed experiments on Plan- etLab, with nodes based in the United States and Canada. The evaluation involves analyzing the algo- 3 THREAT MODEL rithm’s efficacy in distinguishing honest clients from The adversary is a human user that programs its client software others, and other factors that affect the accuracy of to evade a geolocation process, to intentionally misrepresent its CPV’s results.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us