2005
DOI: 10.1007/11596042_82
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services

Abstract: Abstract.A survey on location authentication protocols and spatialtemporal attestation services is presented. Several protocols and services with these objectives have been proposed during the last decade, but still there is a lack of understanding of the security properties they should provide and which security mechanisms are appropriate. We first define the goals and threat model of location authentication protocols, next they are described and analyzed against this model. Also, spatial-temporal attestation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…4 Most researchers assume that they can't separate location authentication from entity authentication as we have done. Additionally, some believe they can treat both properties independently, 7 and others view location authentication as an alternative to the traditional entity-authentication proofs based on something you have, know, and are.…”
Section: Redefining Location Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…4 Most researchers assume that they can't separate location authentication from entity authentication as we have done. Additionally, some believe they can treat both properties independently, 7 and others view location authentication as an alternative to the traditional entity-authentication proofs based on something you have, know, and are.…”
Section: Redefining Location Authenticationmentioning
confidence: 99%
“…Despite the recent advances, we still need a clearer picture of this property. Here, we extend a survey we published in 2005 4 to provide a more comprehensive definition of location authentication and to describe its main threats in different scenarios. We also give an overview of proposed mechanisms for fulfilling this requirement, taking into account not only location verification but also the related problem of secure location determination.…”
mentioning
confidence: 99%
“…An example would be the aforementioned classroom, where the individual participants could store logs of their own wearable sensors directly in the lecture hall, allowing participants who come late, or maybe even next year's students, to easily find it there, yet preventing someone from half-way around the globe from monitoring their performance in class. 1 While traditional location-based access control methods (Gonzales-Tablas et al 2005) could offer similar functionality, the setup for both users and system administrators would be considerably higher, as locations and their access parameters would need to be explicitly defined.…”
Section: Introductionmentioning
confidence: 99%
“…It is assumed that the spatial-temporal information of the subject is securely verified or authenticated before the evidence is generated. The verifier of location (V loc ) performs this verification in collaboration with a positioning infrastructure (PI); this process is done by executing a location authentication protocol (see a description and an analysis of this kind of protocols in [GKRR05]). Note that considering the user controlling the target device as part of the subject would require to verify also the proximity of this particular user to that target device.…”
Section: Goal and General Modelmentioning
confidence: 99%
“…Several mechanisms have been proposed to address trust of location information, mainly location authentication protocols and spatial-temporal attestation services, which include spatial-temporal certification services. A brief survey on mechanisms that address trust of location information can be found in [GKRR05]. A survey on mechanisms to protect location privacy in pervasive computing can be found in [GTH05].…”
Section: Introductionmentioning
confidence: 99%