Sciweavers

Share
MSWIM
2006
ACM

Two methods of authenticated positioning

10 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept and two architectures for location dependent access control. We start with a number of scenarios. Some of the scenarios play in a global context, some others in a more local environment. We address boths groups of scenarios with different methods of positioning (location providers). We are using a WLAN mesh network to determine the nodes’ positions. We introduce a trustworthy hardware module used for positioning and controlling access to secured data. We show different types of attacks against such systems. Due to the special nature of different location providers we compare several ways how these attacks are impeded. Categories and Subject Descriptors D.4.6 [Software]: Operating Systems—Security and Protection; C.2.1 [Computer Systems Organization]: Computer-communication Networks—Wireless communicat...
Thomas Mundt
Added 14 Jun 2010
Updated 14 Jun 2010
Type Conference
Year 2006
Where MSWIM
Authors Thomas Mundt
Comments (0)
books