Get 20M+ Full-Text Papers For Less Than $1.50/day. Subscribe now for You or Your Team.

Learn More →

Secure verification of location claims

Secure verification of location claims Secure Veri cation of Location Claims — Naveen Sastry University of California, Berkeley Umesh Shankar University of California, Berkeley David Wagner University of California, Berkeley nks@cs.berkeley.edu ushankar@cs.berkeley.edu daw@cs.berkeley.edu ABSTRACT With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location veri cation, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location veri cation. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection Access controls; D.4.6 [Operating Systems]: Security and Protection Authentication General Terms Security, Algorithms Keywords Secure Location Authentication, Secure Location Veri cation, Sensor Networks 1. INTRODUCTION Computer scientists are used to studying access control mechanisms where one ™s identity determines what one is authorized to do. However, in the physical world, identity is not the only thing that matters: often, the physical location of the requester also plays an important role in determining access rights. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Secure verification of location claims

Association for Computing Machinery — Sep 19, 2003

Loading next page...
 
/lp/association-for-computing-machinery/secure-verification-of-location-claims-B0NCuIPkGD

References (21)

Datasource
Association for Computing Machinery
Copyright
Copyright © 2003 by ACM Inc.
ISBN
1-58113-769-9
doi
10.1145/941311.941313
Publisher site
See Article on Publisher Site

Abstract

Secure Veri cation of Location Claims — Naveen Sastry University of California, Berkeley Umesh Shankar University of California, Berkeley David Wagner University of California, Berkeley nks@cs.berkeley.edu ushankar@cs.berkeley.edu daw@cs.berkeley.edu ABSTRACT With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location veri cation, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location veri cation. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection Access controls; D.4.6 [Operating Systems]: Security and Protection Authentication General Terms Security, Algorithms Keywords Secure Location Authentication, Secure Location Veri cation, Sensor Networks 1. INTRODUCTION Computer scientists are used to studying access control mechanisms where one ™s identity determines what one is authorized to do. However, in the physical world, identity is not the only thing that matters: often, the physical location of the requester also plays an important role in determining access rights.

There are no references for this article.