Two methods of authenticated positioning

  • Authors:
  • Thomas Mundt

  • Affiliations:
  • University of Rostock

  • Venue:
  • Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept and two architectures for location dependent access control. We start with a number of scenarios. Some of the scenarios play in a global context, some others in a more local environment. We address boths groups of scenarios with different methods of positioning (location providers). We are using a WLAN mesh network to determine the nodes' positions. We introduce a trustworthy hardware module used for positioning and controlling access to secured data. We show different types of attacks against such systems. Due to the special nature of different location providers we compare several ways how these attacks are impeded