The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - July-September (2008 vol.7)
pp: 72-80
Benjam?n Ramos ?lvarez , Universidad Carlos III de Madrid
Arturo Ribagorda Garnacho , Universidad Carlos III de Madrid
ABSTRACT
Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is needed. To provide a clearer picture of this requirement, the authors present a comprehensive definition of location authentication, describe its main threats in different scenarios, and review the mechanisms proposed thus far to fulfil this requirement.
INDEX TERMS
Security, location-dependent applications, protocol analysis and design
CITATION
Benjam?n Ramos ?lvarez, Arturo Ribagorda Garnacho, "Guaranteeing the Authenticity of Location Information", IEEE Pervasive Computing, vol.7, no. 3, pp. 72-80, July-September 2008, doi:10.1109/MPRV.2008.49
REFERENCES
1. C.A. Patterson, R.R. Muntz, and C.M. Pancake, "Challenges in Location-Aware Computing," IEEE Pervasive Computing, vol. 2, no. 2, 2003, pp. 80–89.
2. S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. Workshop Theory and Application of Cryptographic Techniques on Advances in Cryptology, Springer, 1994, pp. 344–359.
3. D.E. Denning and P.F. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Internet Besieged: Countering Cyberspace Scofflaws, ACM Press/Addison-Wesley, 1998.
4. A.I. González-Tablas et al., "Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services," Proc. IFIP Int'l Symp. Network-Centric Ubiquitous Systems, Springer, 2005, pp. 797–806.
5. J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, 2001, pp. 57–66.
6. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001.
7. T. Kindberg and K. Zhang, Context Authentication Using Constrained Channels, HP Labs Tech., 2001.
8. D. Singelee and B. Preneel, "Location Verification Using Secure Distance Bounding Protocols," Proc. IEEE Int'l Conf. Mobile Ad-hoc and Sensor Systems, IEEE CS Press, 2005, pp. 834–840.
9. B.R. Waters and E.W. Felten, Proving the Location of Tamper-Resistant Devices, tech. report TR-667-03, Computer Science Dept., Princeton Univ., 2003.
10. L. Bussard, "Trust Establishment Protocols for Communicating Devices," doctoral dissertation, Institut Eurécom Télécom Paris, 2004.
11. G. Hancke and M.G. Kuhn, "An RFID Distance Bounding Protocol," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks, IEEE CS Press, 2005, pp. 67–73.
12. J. Reid et al., "Detecting Relay Attacks with Timing-Based Protocols," Proc. 2nd ACM Symp. Information, Computer and Comm. Security, ACM Press, 2007, pp. 204–213.
13. N. Sastry et al., "Secure Verification of Location Claims," Proc. 2003 ACM Workshop on Wireless Security, ACM Press, 2003, pp. 1–10.
14. S. Čapkun and J.P. Hubaux, "Securing Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, 2006, pp. 221–232.
15. C. Wullems, O. Pozzobon, and K. Kubik, "Trust Your Receiver? Enhancing Location Security," GPS World, Oct. 2004, pp. 23–30.
16. M. Kuhn, "An Asymmetric Security Mechanism for Navigation Signals," Proc. 6th Information and Hiding Workshop, Springer, 2004, pp. 239–252.
17. D. Liu, P. Ning, and W.K. Du, "Attack-Resistant Location Estimation in Sensor Networks," Proc. 4th Int'l Conf. Information Processing in Sensor Networks, IEEE Press, 2005, pp. 99–106.
18. Z. Li et al., "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks," Proc. 4th Int'l Conf. Information Processing in Sensor Networks, IEEE Press, 2005, pp. 91–98.
19. A. Vora and M. Nesterenko, "Secure Location Verification Using Radio Broadcast," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, 2006, pp. 377–385.
20. F. Anjum, S. Pandey, and P. Agrawal, "Secure Localization in Sensor Networks Using Transmission Range Variation," Proc. IEEE Int'l Conf. Mobile Ad-hoc and Sensor Systems, IEEE Press, 2005.
21. L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 21–30.
22. M. Pirreti et al., SLAT: Secure Localization with Attack Tolerance, tech. report NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ., 2005.
23. J. Clulow et al., "So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks," Proc. Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, Springer, 2006, pp. 83–97.
24. C. Meadows et al., "Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks," Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2007, pp. 279–298.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool