Filters








3,676 Hits in 3.7 sec

Secure Location Verification [chapter]

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
2010 Lecture Notes in Computer Science  
In this paper, we analyze the security of this signal authentication mechanism and show how it can be used to establish a secure location verification service with global coverage.  ...  Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been proposed.  ...  Conclusion The new mechanism to authenticate GPS signals is very promising to enable secure location verification services.  ... 
doi:10.1007/978-3-642-13739-6_29 fatcat:senid6uuprbqzbnr53qzfz74fe

Secure verification of location claims

Naveen Sastry, Umesh Shankar, David Wagner
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
Then, we present the Echo protocol, a simple method for secure location verification.  ...  We introduce the concept of secure location verification, and we show how it can be used for location-based access control.  ...  However, none of those works addressed security, and in fact, GPS signals can be spoofed [17, §3.2.2] .  ... 
doi:10.1145/941311.941313 dblp:conf/ws/SastrySW03 fatcat:ah3tm5objbeahldx7q2mcbhkz4

Secure verification of location claims

Naveen Sastry, Umesh Shankar, David Wagner
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
Then, we present the Echo protocol, a simple method for secure location verification.  ...  We introduce the concept of secure location verification, and we show how it can be used for location-based access control.  ...  However, none of those works addressed security, and in fact, GPS signals can be spoofed [17, §3.2.2] .  ... 
doi:10.1145/941312.941313 fatcat:ar5xt5q5vnhghgaqduxui535xi

Secure Location Verification with Hidden and Mobile Base Stations

S. Capkun, K.B. Rasmussen, M. Cagalj, M. Srivastava
2008 IEEE Transactions on Mobile Computing  
Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight.  ...  In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations.  ...  Recently, a number of secure distance and location verification have been proposed.  ... 
doi:10.1109/tmc.2007.70782 fatcat:ewyobp6cuzelvef5tpbs4nchie

Lightweight Location Verification in Air Traffic Surveillance Networks

Martin Strohmeier, Vincent Lenders, Ivan Martinovic
2015 Proceedings of the 1st ACM Workshop on Cyber-Physical System Security - CPSS '15  
We propose two alternatives, a statistical location verification technique and a grid-based location estimation approach, to deal with the identified threats.  ...  Our results show that the statistical verification approach can increase the effective air traffic surveillance coverage compared to multilateration by a factor of more than 100.  ...  ., [10, 26] ) have conducted a holistic security analysis of the NextGen implementation plan and discussed cryptographic means to deal with authentication issues in ADS-B.  ... 
doi:10.1145/2732198.2732202 dblp:conf/ccs/StrohmeierLM15 fatcat:iv4szt3pdnfz7pxukokopr53aa

CPV: Delay-Based Location Verification for the Internet

AbdelRahman Abdou, Ashraf Matrawy, P. C. van Oorschot
2017 IEEE Transactions on Dependable and Secure Computing  
The number of location-aware services over the Internet continues growing. Some of these require the client's geographic location for security-sensitive applications.  ...  Results highlight the potential of CPV for practical adoption. ! 1. The verification region is in fact a triangular, rather than a circular, one as we explain in §4.  ...  The third author acknowledges funding from NSERC for both his Canada Research Chair in Authentication and Computer Security, and a Discovery Grant.  ... 
doi:10.1109/tdsc.2015.2451614 fatcat:hzbizhszxneajmufol3tndftvy

Experimental Analysis of the Femtocell Location Verification Techniques [chapter]

Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert
2012 Lecture Notes in Computer Science  
Here we study the risks associated with the location verification techniques of femtocells.  ...  First we state the goals of location verification and describe techniques implemented in the existing femtocells.  ...  The HNB can receive the location information from the A-GPS unit and deliver it to the home registration server for the verification.  ... 
doi:10.1007/978-3-642-27937-9_4 fatcat:vdmioeaaubcxbjuwqhpriipiou

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services

Oscar Pozzobon, Chris Wullems, Kurt Kubik
2004 Journal of Global Positioning Systems  
This paper describes a secure framework for tracking applications that use the Galileo signal authentication services.  ...  First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed.  ...  GPS signal authentication is necessary for secure tracking in order to prevent a hijacker from simply spoofing the reported location.  ... 
doi:10.5081/jgps.3.1.200 fatcat:tplsg66kn5en5j6bo57j6wibbe

Smartphones as Practical and Secure Location Verification Tokens for Payments

Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Čapkun
2014 Proceedings 2014 Network and Distributed System Security Symposium   unpublished
We propose a novel location-based second-factor authentication solution for modern smartphones.  ...  In particular, we show that practical deployment of smartphone-based second-factor authentication requires a secure enrollment phase that binds the user to his smartphone TEE and allows convenient device  ...  This work was partially supported by the Zurich Information Security Center (ZISC). It represents the views of the authors.  ... 
doi:10.14722/ndss.2014.23165 fatcat:d2vr7vhobjcfvgzctvawyk5vxq

Secure Verification of Location Claims with Simultaneous Distance Modification [chapter]

Vitaly Shmatikov, Ming-Hsiu Wang
Lecture Notes in Computer Science  
We demonstrate that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device.  ...  We use the standard model for location verification [WF03,SSW03,ČH05]. The goal of a malicious device is to be localized in a place other than its true location.  ...  Conclusions We proposed a new simultaneous distance modification property for distance estimation protocols, and demonstrated that this property enables secure verification of location claims of mobile  ... 
doi:10.1007/978-3-540-76929-3_17 dblp:conf/asian/ShmatikovW07 fatcat:5bofil3wevgrbhj6rqrxxy7ksi

Secure positioning in wireless networks

S. Capkun, J.-P. Hubaux
2006 IEEE Journal on Selected Areas in Communications  
We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks.  ...  So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting.  ...  Recently, a number of secure distance and location verification have been proposed.  ... 
doi:10.1109/jsac.2005.861380 fatcat:owefro7r7jgnxgzfp7hkeygij4

Guaranteeing the Authenticity of Location Information

Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho
2008 IEEE pervasive computing  
authentication system 3 location signatures (specific differ- ential GpS) multiple (all in view) Satellite network (GpS) radio Secure and private proofs of location- absolute-position  ...  A comprehensive definition of location authentication and a review of its threats and possible solutions help provide a better understanding of this young security requirement.  ... 
doi:10.1109/mprv.2008.49 fatcat:6zmlj4ufyfdjdfofqp6mpcu7nq

CREDIT CARD FORGERY IDENTIFICATION SYSTEM WITH LOCATION BASED TRACKING USING MOBILES WITH GPS

S. Hemamalini, S. Dillirani, G.G. Girija, M. L. Alphin Ezhil Manuel
2012 International Journal of Communication Networks and Security  
In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user.  ...  In LRAP, the user's location can be determined by a third party used by user's mobile for secure payment operations.  ...  For anyone with a GPS receiver, However, from the security point of view, the authenticity of the GPS signal is not guaranteed because a false (or spoofed) GPS signal could be generated by a dedicated  ... 
doi:10.47893/ijcns.2012.1037 fatcat:y6f2f6p4sjaxxkvdf4p5gg7unq

A Systematic Approach for Attack Analysis and Mitigation in V2V Networks

Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin
2016 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down  ...  The proposed analysis approach is promising to provide guidance for research in optimization models for tradeoffs between security, safety and performance requirements in V2V.  ...  Acknowledgments This publication was made possible by NPRP grant # [7-1113-1-199] from the Qatar National Research Fund (a member of Qatar Foundation).  ... 
doi:10.22667/jowua.2016.03.31.079 dblp:journals/jowua/BhargavaJMA16 fatcat:m3ej7zx4ofha3oq4efsfnvkbm4

Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms

Gurjeet Kaur
2012 International Journal of Security Privacy and Trust Management  
Firstly Location Verification is done; server verifies the User's Mobile Phone's location against authorized location.  ...  With the growth of the importance and of the audience of location-based services, questions of security and privacy are brought forward.  ...  Once GPS receiver receives the GPS signal and determine location information which is latitude and longitude.  ... 
doi:10.5121/ijsptm.2012.1602 fatcat:3atsnwo3afe6jpmgsb5d4jbzde
« Previous Showing results 1 — 15 out of 3,676 results