Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Location constraints in digital rights management
Computer Communications
A critical evaluation of location based services and their potential
Journal of Location Based Services
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Context-sensitive authorization in interaction patterns
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
A visual way to talk to strangers: authentication in wireless pervasive computing
International Journal of Ad Hoc and Ubiquitous Computing
Using a spatial context authentication proxy for establishing secure wireless connections
Journal of Mobile Multimedia
Contextualizing security for digital long-term preservation
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Integrated support for location aware security services in enterprise wireless networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Attribute-Based authentication model for dynamic mobile environments
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
When context is better than identity: authentication by context using empirical channels
SP'11 Proceedings of the 19th international conference on Security Protocols
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
This paper presents practical protocols for authenticating the parameters that characterise aprincipal's context. Context features in what are known as mobile, ubiquitous, pervasive and nomadic computing systems. Location, in particular, is a highly significant contextual parameter. We present a model of context authentication based on the characteristics ofcommunication channels. Then we present protocols for location authentication that are based on physical channel characteristics, including a protocol that we have implemented over HTTP for use from any Web browser. We conclude with a summary and discussion of the work.