A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Location Verification
[chapter]
2010
Lecture Notes in Computer Science
In this paper, we analyze the security of this signal authentication mechanism and show how it can be used to establish a secure location verification service with global coverage. ...
Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been proposed. ...
Conclusion The new mechanism to authenticate GPS signals is very promising to enable secure location verification services. ...
doi:10.1007/978-3-642-13739-6_29
fatcat:senid6uuprbqzbnr53qzfz74fe
Secure verification of location claims
2003
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
Then, we present the Echo protocol, a simple method for secure location verification. ...
We introduce the concept of secure location verification, and we show how it can be used for location-based access control. ...
However, none of those works addressed security, and in fact, GPS signals can be spoofed [17, §3.2.2] . ...
doi:10.1145/941311.941313
dblp:conf/ws/SastrySW03
fatcat:ah3tm5objbeahldx7q2mcbhkz4
Secure verification of location claims
2003
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
Then, we present the Echo protocol, a simple method for secure location verification. ...
We introduce the concept of secure location verification, and we show how it can be used for location-based access control. ...
However, none of those works addressed security, and in fact, GPS signals can be spoofed [17, §3.2.2] . ...
doi:10.1145/941312.941313
fatcat:ar5xt5q5vnhghgaqduxui535xi
Secure Location Verification with Hidden and Mobile Base Stations
2008
IEEE Transactions on Mobile Computing
Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. ...
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. ...
Recently, a number of secure distance and location verification have been proposed. ...
doi:10.1109/tmc.2007.70782
fatcat:ewyobp6cuzelvef5tpbs4nchie
Lightweight Location Verification in Air Traffic Surveillance Networks
2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security - CPSS '15
We propose two alternatives, a statistical location verification technique and a grid-based location estimation approach, to deal with the identified threats. ...
Our results show that the statistical verification approach can increase the effective air traffic surveillance coverage compared to multilateration by a factor of more than 100. ...
., [10, 26] ) have conducted a holistic security analysis of the NextGen implementation plan and discussed cryptographic means to deal with authentication issues in ADS-B. ...
doi:10.1145/2732198.2732202
dblp:conf/ccs/StrohmeierLM15
fatcat:iv4szt3pdnfz7pxukokopr53aa
CPV: Delay-Based Location Verification for the Internet
2017
IEEE Transactions on Dependable and Secure Computing
The number of location-aware services over the Internet continues growing. Some of these require the client's geographic location for security-sensitive applications. ...
Results highlight the potential of CPV for practical adoption. ! 1. The verification region is in fact a triangular, rather than a circular, one as we explain in §4. ...
The third author acknowledges funding from NSERC for both his Canada Research Chair in Authentication and Computer Security, and a Discovery Grant. ...
doi:10.1109/tdsc.2015.2451614
fatcat:hzbizhszxneajmufol3tndftvy
Experimental Analysis of the Femtocell Location Verification Techniques
[chapter]
2012
Lecture Notes in Computer Science
Here we study the risks associated with the location verification techniques of femtocells. ...
First we state the goals of location verification and describe techniques implemented in the existing femtocells. ...
The HNB can receive the location information from the A-GPS unit and deliver it to the home registration server for the verification. ...
doi:10.1007/978-3-642-27937-9_4
fatcat:vdmioeaaubcxbjuwqhpriipiou
Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services
2004
Journal of Global Positioning Systems
This paper describes a secure framework for tracking applications that use the Galileo signal authentication services. ...
First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed. ...
GPS signal authentication is necessary for secure tracking in order to prevent a hijacker from simply spoofing the reported location. ...
doi:10.5081/jgps.3.1.200
fatcat:tplsg66kn5en5j6bo57j6wibbe
Smartphones as Practical and Secure Location Verification Tokens for Payments
2014
Proceedings 2014 Network and Distributed System Security Symposium
unpublished
We propose a novel location-based second-factor authentication solution for modern smartphones. ...
In particular, we show that practical deployment of smartphone-based second-factor authentication requires a secure enrollment phase that binds the user to his smartphone TEE and allows convenient device ...
This work was partially supported by the Zurich Information Security Center (ZISC). It represents the views of the authors. ...
doi:10.14722/ndss.2014.23165
fatcat:d2vr7vhobjcfvgzctvawyk5vxq
Secure Verification of Location Claims with Simultaneous Distance Modification
[chapter]
Lecture Notes in Computer Science
We demonstrate that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device. ...
We use the standard model for location verification [WF03,SSW03,ČH05]. The goal of a malicious device is to be localized in a place other than its true location. ...
Conclusions We proposed a new simultaneous distance modification property for distance estimation protocols, and demonstrated that this property enables secure verification of location claims of mobile ...
doi:10.1007/978-3-540-76929-3_17
dblp:conf/asian/ShmatikovW07
fatcat:5bofil3wevgrbhj6rqrxxy7ksi
Secure positioning in wireless networks
2006
IEEE Journal on Selected Areas in Communications
We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. ...
So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. ...
Recently, a number of secure distance and location verification have been proposed. ...
doi:10.1109/jsac.2005.861380
fatcat:owefro7r7jgnxgzfp7hkeygij4
Guaranteeing the Authenticity of Location Information
2008
IEEE pervasive computing
authentication
system 3
location
signatures
(specific differ-
ential GpS)
multiple
(all in view)
Satellite network
(GpS)
radio
Secure and private
proofs of location-
absolute-position ...
A comprehensive definition of location authentication and a review of its threats and possible solutions help provide a better understanding of this young security requirement. ...
doi:10.1109/mprv.2008.49
fatcat:6zmlj4ufyfdjdfofqp6mpcu7nq
CREDIT CARD FORGERY IDENTIFICATION SYSTEM WITH LOCATION BASED TRACKING USING MOBILES WITH GPS
2012
International Journal of Communication Networks and Security
In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user. ...
In LRAP, the user's location can be determined by a third party used by user's mobile for secure payment operations. ...
For anyone with a GPS receiver, However, from the security point of view, the authenticity of the GPS signal is not guaranteed because a false (or spoofed) GPS signal could be generated by a dedicated ...
doi:10.47893/ijcns.2012.1037
fatcat:y6f2f6p4sjaxxkvdf4p5gg7unq
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks
2016
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down ...
The proposed analysis approach is promising to provide guidance for research in optimization models for tradeoffs between security, safety and performance requirements in V2V. ...
Acknowledgments This publication was made possible by NPRP grant # [7-1113-1-199] from the Qatar National Research Fund (a member of Qatar Foundation). ...
doi:10.22667/jowua.2016.03.31.079
dblp:journals/jowua/BhargavaJMA16
fatcat:m3ej7zx4ofha3oq4efsfnvkbm4
Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms
2012
International Journal of Security Privacy and Trust Management
Firstly Location Verification is done; server verifies the User's Mobile Phone's location against authorized location. ...
With the growth of the importance and of the audience of location-based services, questions of security and privacy are brought forward. ...
Once GPS receiver receives the GPS signal and determine location information which is latitude and longitude. ...
doi:10.5121/ijsptm.2012.1602
fatcat:3atsnwo3afe6jpmgsb5d4jbzde
« Previous
Showing results 1 — 15 out of 3,676 results