Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services

  • A. I. González-Tablas
  • K. Kursawe
  • B. Ramos
  • A. Ribagorda
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3823)


A survey on location authentication protocols and spatial-temporal attestation services is presented. Several protocols and services with these objectives have been proposed during the last decade, but still there is a lack of understanding of the security properties they should provide and which security mechanisms are appropriate. We first define the goals and threat model of location authentication protocols, next they are described and analyzed against this model. Also, spatial-temporal attestation services are described and classified depending on their goal and kind of issued evidence.


Global Navigation Satellite System Global Navigation Satellite System Trusted Third Party Impersonation Attack Threat Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [BC94]
    Brands, S., Chaum, D.: Distance-bounding protocols. In: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp. 344–359. Springer, New York (1994)Google Scholar
  2. [Bus04]
    Bussard, L.: Trust Establishment Protocols for Communicating Devices. PhD thesis, Institut Eurécom, Télécom Paris (2004)Google Scholar
  3. [ČBH03]
    Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: 1st ACM Workshop on Security in Ad Hoc and Sensor Networks, October 31 (2003)Google Scholar
  4. [ČH04]
    Čapkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical Report EPFL/IC/200443, EPFL (May 2004)Google Scholar
  5. [GTRR03]
    González-Tablas, A.I., Ramos, B., Ribagorda, A.: Path-Stamps: A proposal for enhancing the security of location tracking applications. In: Ubiquitous Mobile Information and Collaboration Systems Workshop (2003)Google Scholar
  6. [GW99]
    Gabber, E., Wool, A.: On location-restricted services. IEEE Network (November/December 1999)Google Scholar
  7. [HB01]
    Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing. Technical Report UW-CSE 01-08-03, University of Washington (2001)Google Scholar
  8. [ISO97]
    ISO/IEC 10181-4. Information technology - OSI - Security frameworks in open systems - Part 4: Non-repudiation framework (1997)Google Scholar
  9. [Kuh04]
    Kuhn, M.: An asymmetric security mechanism for navigation signals. In: 6th Information and Hiding Workshop, May 23-25 (2004)Google Scholar
  10. [KZ01a]
    Kabatnik, M., Zugenmaier, A.: Location stamps for digital signatures: A new service for mobile telephone networks. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, p. 20. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. [KZ01b]
    Kindberg, T., Zhang, K.: Context authentication using constrained channels. Report HPL-2001-84. Technical report, HP Labs Tech. (2001)Google Scholar
  12. [LSBP03]
    Lakshminarayanan, A., Singh, V., Bao, F., Prabhu, K.P.: Patent WO 03/007542. Method for certifying location stamping for wireless transactions (2003); Publication date (23/01/2003)Google Scholar
  13. [Mic03]
    Michalakis, N.: Location aware access control for pervasive computing environments. Master’s thesis, MIT (2003)Google Scholar
  14. [MMZ+97]
    MacDoran, P.F., Mathews, M.B., Ziel, F.A., Gold, K.L., Anderson, S.M., Coffey, M.A., Denning, D.E.: Patent WO 97/13341. Method and Apparatus for Authenticating the Location of Remote Users of Network Computing Systems (1997); Publication date (10/04/1997)Google Scholar
  15. [NNT03]
    Nakanishi, K., Nakazawa, J., Tokuda, H.: LEXP: Preserving user privacy and certifying the location information. In: Proc. of the 2nd Workshop on Security in Ubiquitous Computing, UBICOMP 2003 (October 2003)Google Scholar
  16. [PWK04]
    Pozzobon, O., Wullems, C., Kubik, K.: Secure tracking using Galileo services. In: Proc. of the 2004 Intl. Symposium on GNSS/GPS (2004)Google Scholar
  17. [SSW03]
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the 2003 ACM workshop on Wireless security. ACM Press, New York (2003)Google Scholar
  18. [WF03]
    Waters, B.R., Felten, E.W.: Secure, Private Proofs of Location. TR-667-03. Technical report, Princenton, Computer Science (January 2003)Google Scholar
  19. [ZKK01]
    Zugenmaier, A., Kreutzer, M., Kabatnik, M.: Enhancing applications with approved location stamps. In: Proc. of IEEE Intelligent Network 2001 Workshop, IN 2001 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • A. I. González-Tablas
    • 1
  • K. Kursawe
    • 2
  • B. Ramos
    • 1
  • A. Ribagorda
    • 1
  1. 1.Computer Science Department, SeTIUniversidad Carlos IIIMadridSpain
  2. 2.Department Electrical Engineering, ESAT, COSICKatholieke Universiteit LeuvenLeuvenBelgium

Personalised recommendations