Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks 2006
DOI: 10.1145/1180345.1180347
|View full text |Cite
|
Sign up to set email alerts
|

Inverting sensor networks and actuating the environment for spatio-temporal access control

Abstract: Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is possible to invert the role of sensor networks, and allow sensor nodes to actuate the environment. Such actuation can facilitate new forms of access control that are based on whether a user is located at the right place at the right time. In this paper, we explore the challenges of supporting spatiotemporal access control, where access… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…In the context of our system, content/data corresponds to multimedia data that are being distributed based on the location of a user. Location-based data are related to a particular location and are the same for all the nodes within the access region for that content [10]. We note that, for simplicity of discussion in the remainder of the paper, we will not consider temporal aspects related to content distribution.…”
Section: Assumptionsmentioning
confidence: 99%
“…In the context of our system, content/data corresponds to multimedia data that are being distributed based on the location of a user. Location-based data are related to a particular location and are the same for all the nodes within the access region for that content [10]. We note that, for simplicity of discussion in the remainder of the paper, we will not consider temporal aspects related to content distribution.…”
Section: Assumptionsmentioning
confidence: 99%
“…Further, it is not always possible to deploy more landmarks due to environmental constraints. In addition, for certain applications, such as position verification in Spatial Access Control [2], [3], very high location accuracy results are not needed, so additional landmarks would be wasteful. Thus, it is advantageous to use environmental properties from sensor networks to help determine and verify positions without requiring the infrastructure of additional landmarks.…”
Section: Problem Overviewmentioning
confidence: 99%
“…More generally speaking, p can represent a point ðx; yÞ or a region. Let ¼ P Â T be the spatiotemporal region [2] that we are interested in, and E be the domain of environmental parameter values, then there exists a mapping f : À! E that takes the physical position p and maps it to an environmental parameter reading E p;t , as presented in Fig.…”
Section: A Generalized Measurement Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As these location services migrate from the laboratory, it will become increasingly important that the location information utilized by these services is trustworthy. Notably, before an entity should be allowed access to location-restricted files, as discussed in [2], it is essential that position information be verifiable.…”
Section: Introductionmentioning
confidence: 99%