EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
The cricket compass for context-aware mobile applications
Proceedings of the 7th annual international conference on Mobile computing and networking
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Fine-grained network time synchronization using reference broadcasts
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
The Implications of Pervasive Computing on Network Design
BT Technology Journal
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
On the establishment of distinct identities in overlay networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Po^2V Network Layer Position Verification in Multi-HopWireless Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
LAD: localization anomaly detection for wireless sensor networks
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure Location Verification Using Radio Broadcast
IEEE Transactions on Dependable and Secure Computing
Cryptographic key exchange based on locationing information
Pervasive and Mobile Computing
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Detecting relay attacks with timing-based protocols
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A low-cost robust localization scheme for WLAN
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Simple and effective defense against evil twin access points
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Location constraints in digital rights management
Computer Communications
On extracting consistent graphs in wireless sensor networks
International Journal of Sensor Networks
Location verification using bidirectional one-way hash function in wireless sensor networks
International Journal of Sensor Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure localization with phantom node detection
Ad Hoc Networks
Providing VANET security through active position detection
Computer Communications
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
On the interaction between localization and location verification for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Towards movement-aware access control
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
A practical secure neighbor verification protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Let's Get Physical: Models and Methods for Real-World Security Protocols
TPHOLs '09 Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Pollution attack: a new attack against localization in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Secure localization in wireless sensor networks
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Robust wireless localization to attacks on access points
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Proving your location without giving up your privacy
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
On the tradeoff between trust and privacy in wireless ad hoc networks
Proceedings of the third ACM conference on Wireless network security
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
Collaborative location certification for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Bilateration: an attack-resistant localization algorithm of wireless sensor network
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Utilization of user feedback in indoor positioning system
Pervasive and Mobile Computing
A novel trust evaluation model for mobile P2P networks
NPC'10 Proceedings of the 2010 IFIP international conference on Network and parallel computing
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
Indoor localisation robustness and performance improvement
International Journal of Communication Networks and Distributed Systems
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Group distance bounding protocols
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Produre: A novel proximity discovery mechanism in location tagging system
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Position-based quantum cryptography: impossibility and constructions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Secure localization using dynamic verifiers
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
A note on a privacy-preserving distance-bounding protocol
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Location verification based defense against sybil attack in sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Countering identity theft through digital uniqueness, location cross-checking, and funneling
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Secure localization and location verification in sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Survey on location authentication protocols and spatial-temporal attestation services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Integrated support for location aware security services in enterprise wireless networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Selective location blinding using hash chains
SP'11 Proceedings of the 19th international conference on Security Protocols
Performance evaluation of key exchange using integrity regions in different mobility models
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Locanyms: towards privacy-preserving location-based services
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
AMORES: an architecture for mobiquitous resilient systems
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Toward attack-resistant localization under infrastructure attacks
Security and Communication Networks
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies
Mobile Networks and Applications
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On device authentication in wireless networks: present issues and future challenges
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
The man who was there: validating check-ins in location-based services
Proceedings of the 29th Annual Computer Security Applications Conference
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.