Abstract. In many cases, we can only have access to a service by prov-ing we are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guaranteed through signal attenuation. However, by using additional transmitters an attacker can relay signals between the prover and the verifier. Distance-bounding protocols are the main countermeasure against such attacks; however, such protocols may leak information regarding the location of the prover and/or the verifier who run the distance-bounding protocol. In this paper, we consider a formal model for location privacy in the con-text of distance-bounding. In particular, our contributions are threefold: we first define a security...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
In many cases, we can only have access to a service by proving we are sufficiently close to a partic...
Distance bounding protocols have been proposed for many security critical applications as a means of...
Location-based services (LBSs) assume that users are willing to release trustworthy and useful detai...
Distance bounding protocols enable a device to establish an upper bound on the physical distance to ...
Abstract—Location Based Services (LBS) are becoming in-creasingly popular. Users enjoy a wide range ...
It is a well-known fact that the progress of personal communication devices leads to serious concern...
Abstract. Mobile users expose their location to potentially untrusted entities by using location-bas...
Abstract. Mobile users expose their location to potentially untrusted entities by using location-bas...
Proximity services alert users about the presence of other users or moving objects based on their di...
© 2014 IEEE. Recently, there has been a rapid growth in location-based systems and applications in w...
The aim of proximity services is to raise alerts based on the distance between moving objects. While...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
In many cases, we can only have access to a service by proving we are sufficiently close to a partic...
Distance bounding protocols have been proposed for many security critical applications as a means of...
Location-based services (LBSs) assume that users are willing to release trustworthy and useful detai...
Distance bounding protocols enable a device to establish an upper bound on the physical distance to ...
Abstract—Location Based Services (LBS) are becoming in-creasingly popular. Users enjoy a wide range ...
It is a well-known fact that the progress of personal communication devices leads to serious concern...
Abstract. Mobile users expose their location to potentially untrusted entities by using location-bas...
Abstract. Mobile users expose their location to potentially untrusted entities by using location-bas...
Proximity services alert users about the presence of other users or moving objects based on their di...
© 2014 IEEE. Recently, there has been a rapid growth in location-based systems and applications in w...
The aim of proximity services is to raise alerts based on the distance between moving objects. While...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...