Abstract-EVAWEB is a Web-based assessment system that has been developed to evaluate the learning enhancement produced by the use of X.509 Public Key Infrastructure (X.509/PKIX)-based digital signatures in a real environment. EVAWEB allows the students to experience main X.509/PKIX processes related to the digital signature mechanism. In this paper, EVAWEB and its assessment by the students are described.Index Terms-Digital signatures, innovation in security teaching, Web-based assessment, X.509 Public Key Infrastructure (X.509/PKIX).
A comprehensive definition of location authentication and a review of its threats and possible solutions help provide a better understanding of this young security requirement. N ew and enhanced locationdetermination technologies have allowed ubiquitous computing applications to better exploit location information. In particular, these technologies have improved location-based services, such as emergency and navigation services, tracking and monitoring systems, and location-based billing services. They also apply to more specific contexts-for example, in sensor networks, location information is often crucial for node tracking and packet routing.This increasing use of location information has driven researchers to analyze its specific security requirements. 1 The most important requirements relate to privacy and trust, including authenticity and attestation. Here, we focus on authenticating location information, which is necessary when using such information to grant access to a service or to generate evidence such as a certificate guaranteeing an entity's location at some point in time. It's also useful for accountable tracking of nodes and billing of mobile services. More important, for some services-such as emergency related services-failing to guarantee location information can have fatal consequences.Location authentication is still a relatively young security property. Stefan Brands and David Chaum first addressed location authentication in 1994, 2 followed by Dorothy Denning and Peter MacDoran in 1996. 3 Researchers have since increased their efforts to understand location authentication, proposing several solutions for different contexts. Despite the recent advances, we still need a clearer picture of this property. Here, we extend a survey we published in 2005 4 to provide a more comprehensive definition of location authentication and to describe its main threats in different scenarios. We also give an overview of proposed mechanisms for fulfilling this requirement, taking into account not only location verification but also the related problem of secure location determination. Location determinationWe start with a brief overview of location determination because of its obvious importance to location authentication. One main approach to location determination is to use an object's internal measurements, such as inertial navigation or odometry techniques. However, the more common approach in ubiquitous computing is to use a reference system that exploits triangulation, proximity, or scene-analysis techniques. 5 Typically, reference-based location determination considers the exchange of signals between a target node (the one being located) and a set
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.