@affitz

Secure Verification of Location Claims

, , and . Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)

Abstract

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.

Description

Secure verification of location claims

Links and resources

Tags

community

  • @dblp
  • @affitz
@affitz's tags highlighted