Secure Verification of Location Claims
Naveen Sastry and Umesh Shankar and David Wagner
EECS Department, University of California, Berkeley
Technical Report No. UCB/CSD-03-1245
, 2003
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1245.pdf
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
BibTeX citation:
@techreport{Sastry:CSD-03-1245, Author= {Sastry, Naveen and Shankar, Umesh and Wagner, David}, Title= {Secure Verification of Location Claims}, Year= {2003}, Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html}, Number= {UCB/CSD-03-1245}, Abstract= {With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or highly accurate clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.}, }
EndNote citation:
%0 Report %A Sastry, Naveen %A Shankar, Umesh %A Wagner, David %T Secure Verification of Location Claims %I EECS Department, University of California, Berkeley %D 2003 %@ UCB/CSD-03-1245 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2003/5550.html %F Sastry:CSD-03-1245