Secure Location Verification Using Simultaneous Multilateration
نویسندگان
چکیده
منابع مشابه
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols satisfying the SDM property, a malicious device can lie about its distance from the verifiers, but all distances can only be altered by the same amount. We demonstrate that the SDM property guarantees secure verification...
متن کاملSecure location verification and determination
This document considers two different approaches dealing with secure location claims. The first protocol is called ECHO [1] and handles with the secure verification of a location via ultra-sound. The second procedure increases the robustness of location determination protocols like RADAR [2]. Those are using standard IEEE 802.11 equipment. The document gives an introduction, overview, analysis ...
متن کاملSecure probabilistic location verification in randomly deployed wireless sensor networks
Security plays an important role in the ability to deploy and retrieve trustworthy data from a wireless sensor network. Location verification is an effective defense against attacks which take advantage of a lack, or compromise, of location information. In this work, a secure probabilistic location verification method for randomly deployed dense sensor networks is proposed. The proposed Probabi...
متن کاملSecure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this is the lack of location verification techniques with global coverage. Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been propo...
متن کاملSmartphones as Practical and Secure Location Verification Tokens for Payments
We propose a novel location-based second-factor authentication solution for modern smartphones. We demonstrate our solution in the context of point of sale transactions and show how it can be effectively used for the detection of fraudulent transactions caused by card theft or counterfeiting. Our scheme makes use of Trusted Execution Environments (TEEs), such as ARM TrustZone, commonly availabl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2012
ISSN: 1536-1276
DOI: 10.1109/twc.2011.120911.101147