Naveen Sastry and Umesh Shankar and David Wagner

EECS Department, University of California, Berkeley

Technical Report No. UCB/CSD-03-1245

, 2003

http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1245.pdf

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.


BibTeX citation:

@techreport{Sastry:CSD-03-1245,
    Author= {Sastry, Naveen and Shankar, Umesh and Wagner, David},
    Title= {Secure Verification of Location Claims},
    Year= {2003},
    Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html},
    Number= {UCB/CSD-03-1245},
    Abstract= {With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.},
}

EndNote citation:

%0 Report
%A Sastry, Naveen 
%A Shankar, Umesh 
%A Wagner, David 
%T Secure Verification of Location Claims
%I EECS Department, University of California, Berkeley
%D 2003
%@ UCB/CSD-03-1245
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html
%F Sastry:CSD-03-1245