ABSTRACT With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices
Abstract—With the proliferation of wireless communication technologies and mobile computing devices,...
Abstract—In this work, we propose and analyse a new approach for securing localization and location ...
Abstract. Mobile network operators are adapting femtocells in order to simplify their network archit...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
In this work, we propose and analyse a new approach for securing localization and location verificat...
Abstract — The location information is critical for many location-aware applications and services. R...
Abstract. In many location-based services, the user location is deter-mined on the mobile device and...
Abstract—With the proliferation of wireless communication technologies and mobile computing devices,...
Abstract—In this work, we propose and analyse a new approach for securing localization and location ...
Abstract. Mobile network operators are adapting femtocells in order to simplify their network archit...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
A comprehensive definition of location authentication and a review of its threats and possible solut...
Abstract—Authentication in conventional networks (like the Internet) is usually based upon something...
In this work, we propose and analyse a new approach for securing localization and location verificat...
Abstract — The location information is critical for many location-aware applications and services. R...
Abstract. In many location-based services, the user location is deter-mined on the mobile device and...
Abstract—With the proliferation of wireless communication technologies and mobile computing devices,...
Abstract—In this work, we propose and analyse a new approach for securing localization and location ...
Abstract. Mobile network operators are adapting femtocells in order to simplify their network archit...