Secure Verification of Location Claims

Naveen Sastry, Umesh Shankar and David Wagner

EECS Department
University of California, Berkeley
Technical Report No. UCB/CSD-03-1245
2003

http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1245.pdf

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.


BibTeX citation:

@techreport{Sastry:CSD-03-1245,
    Author = {Sastry, Naveen and Shankar, Umesh and Wagner, David},
    Title = {Secure Verification of Location Claims},
    Institution = {EECS Department, University of California, Berkeley},
    Year = {2003},
    URL = {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html},
    Number = {UCB/CSD-03-1245},
    Abstract = {With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.}
}

EndNote citation:

%0 Report
%A Sastry, Naveen
%A Shankar, Umesh
%A Wagner, David
%T Secure Verification of Location Claims
%I EECS Department, University of California, Berkeley
%D 2003
%@ UCB/CSD-03-1245
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html
%F Sastry:CSD-03-1245