N. Sastry, U. Shankar, and D. Wagner. Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)
Abstract
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
%0 Conference Paper
%1 Sastry03
%A Sastry, Naveen
%A Shankar, Umesh
%A Wagner, David
%B Proceedings of the 2Nd ACM Workshop on Wireless Security
%C New York, NY, USA
%D 2003
%I ACM
%K location security verification
%P 1--10
%T Secure Verification of Location Claims
%U http://doi.acm.org/10.1145/941311.941313
%X With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
@inproceedings{Sastry03,
abstract = {With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.},
added-at = {2014-10-22T15:45:55.000+0200},
address = {New York, NY, USA},
author = {Sastry, Naveen and Shankar, Umesh and Wagner, David},
biburl = {https://www.bibsonomy.org/bibtex/2ac26da69e832fe335e823bbf73a93aea/affitz},
booktitle = {Proceedings of the 2Nd ACM Workshop on Wireless Security},
description = {Secure verification of location claims},
interhash = {bf95e022bbfb34af680155969070ea5a},
intrahash = {ac26da69e832fe335e823bbf73a93aea},
keywords = {location security verification},
month = sep,
pages = {1--10},
publisher = {ACM},
series = {WiSe},
timestamp = {2017-07-03T14:36:43.000+0200},
title = {Secure Verification of Location Claims},
url = {http://doi.acm.org/10.1145/941311.941313},
year = 2003
}