Abstract
A survey on location authentication protocols and spatial-temporal attestation services is presented. Several protocols and services with these objectives have been proposed during the last decade, but still there is a lack of understanding of the security properties they should provide and which security mechanisms are appropriate. We first define the goals and threat model of location authentication protocols, next they are described and analyzed against this model. Also, spatial-temporal attestation services are described and classified depending on their goal and kind of issued evidence.
Chapter PDF
Similar content being viewed by others
Keywords
- Global Navigation Satellite System
- Global Navigation Satellite System
- Trusted Third Party
- Impersonation Attack
- Threat Model
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Brands, S., Chaum, D.: Distance-bounding protocols. In: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp. 344–359. Springer, New York (1994)
Bussard, L.: Trust Establishment Protocols for Communicating Devices. PhD thesis, Institut Eurécom, Télécom Paris (2004)
Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: 1st ACM Workshop on Security in Ad Hoc and Sensor Networks, October 31 (2003)
Čapkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical Report EPFL/IC/200443, EPFL (May 2004)
González-Tablas, A.I., Ramos, B., Ribagorda, A.: Path-Stamps: A proposal for enhancing the security of location tracking applications. In: Ubiquitous Mobile Information and Collaboration Systems Workshop (2003)
Gabber, E., Wool, A.: On location-restricted services. IEEE Network (November/December 1999)
Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing. Technical Report UW-CSE 01-08-03, University of Washington (2001)
ISO/IEC 10181-4. Information technology - OSI - Security frameworks in open systems - Part 4: Non-repudiation framework (1997)
Kuhn, M.: An asymmetric security mechanism for navigation signals. In: 6th Information and Hiding Workshop, May 23-25 (2004)
Kabatnik, M., Zugenmaier, A.: Location stamps for digital signatures: A new service for mobile telephone networks. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, p. 20. Springer, Heidelberg (2001)
Kindberg, T., Zhang, K.: Context authentication using constrained channels. Report HPL-2001-84. Technical report, HP Labs Tech. (2001)
Lakshminarayanan, A., Singh, V., Bao, F., Prabhu, K.P.: Patent WO 03/007542. Method for certifying location stamping for wireless transactions (2003); Publication date (23/01/2003)
Michalakis, N.: Location aware access control for pervasive computing environments. Master’s thesis, MIT (2003)
MacDoran, P.F., Mathews, M.B., Ziel, F.A., Gold, K.L., Anderson, S.M., Coffey, M.A., Denning, D.E.: Patent WO 97/13341. Method and Apparatus for Authenticating the Location of Remote Users of Network Computing Systems (1997); Publication date (10/04/1997)
Nakanishi, K., Nakazawa, J., Tokuda, H.: LEXP: Preserving user privacy and certifying the location information. In: Proc. of the 2nd Workshop on Security in Ubiquitous Computing, UBICOMP 2003 (October 2003)
Pozzobon, O., Wullems, C., Kubik, K.: Secure tracking using Galileo services. In: Proc. of the 2004 Intl. Symposium on GNSS/GPS (2004)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the 2003 ACM workshop on Wireless security. ACM Press, New York (2003)
Waters, B.R., Felten, E.W.: Secure, Private Proofs of Location. TR-667-03. Technical report, Princenton, Computer Science (January 2003)
Zugenmaier, A., Kreutzer, M., Kabatnik, M.: Enhancing applications with approved location stamps. In: Proc. of IEEE Intelligent Network 2001 Workshop, IN 2001 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
González-Tablas, A.I., Kursawe, K., Ramos, B., Ribagorda, A. (2005). Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_82
Download citation
DOI: https://doi.org/10.1007/11596042_82
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)