2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5684072
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware

Abstract: Abstract-Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provides additional and necessary context for making decisions about resource access. For example, sensitive information stored on a laptop (e.g. customer records, social security numbers, etc), may require additional protections if a user operates outside of an approved area. However, current localization techniques based on signal str… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Luo et al have presented a method, which allows the generation of privacy-preserved location proofs [13]. Other methods of secure localization include utilizing social networks [28], or combination of wireless medium, such as WiFi and Bluetooth [29]. However, localization is only a part of the work.…”
Section: Related Workmentioning
confidence: 99%
“…Luo et al have presented a method, which allows the generation of privacy-preserved location proofs [13]. Other methods of secure localization include utilizing social networks [28], or combination of wireless medium, such as WiFi and Bluetooth [29]. However, localization is only a part of the work.…”
Section: Related Workmentioning
confidence: 99%
“…The 'two tests'based scheme in [1] can detect false position claims from a single attacker, but is not secure against collusion attack. The system in [22] uses signal intensity of 802.11 card for accurate location determination, but does not consider collusion attack.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, the fake proofs resemble an actual proof and can be utilized by the user as a false evidence of presence at that location. The related works thus far have not considered any third-party endorsement for location proofs, which makes the schemes vulnerable to collusion attacks [1,[4][5][6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%