With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
Abstract. In many location-based services, the user location is deter-mined on the mobile device and...
International audienceA secure location-based service requires that a mobile user certifies his posi...
International audienceA secure location-based service requires that a mobile user certifies his posi...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
ABSTRACT With the growing prevalence of sensor and wireless networks comes a new demand for location...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
In this work, we propose and analyse a new approach for securing localization and location verificat...
Abstract. We investigate the problem of verifying location claims of mobile devices, and propose a n...
Abstract — The location information is critical for many location-aware applications and services. R...
Abstract. In many location-based services, the user location is deter-mined on the mobile device and...
International audienceA secure location-based service requires that a mobile user certifies his posi...
International audienceA secure location-based service requires that a mobile user certifies his posi...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
ABSTRACT With the growing prevalence of sensor and wireless networks comes a new demand for location...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
In this work, we propose and analyse a new approach for securing localization and location verificat...
Abstract. We investigate the problem of verifying location claims of mobile devices, and propose a n...
Abstract — The location information is critical for many location-aware applications and services. R...
Abstract. In many location-based services, the user location is deter-mined on the mobile device and...
International audienceA secure location-based service requires that a mobile user certifies his posi...
International audienceA secure location-based service requires that a mobile user certifies his posi...