Secure verification of location claims

  • Authors:
  • Naveen Sastry;Umesh Shankar;David Wagner

  • Affiliations:
  • University of California, Berkeley;University of California, Berkeley;University of California, Berkeley

  • Venue:
  • WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.