Title
Two methods of authenticated positioning
Abstract
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept and two architectures for location dependent access control. We start with a number of scenarios. Some of the scenarios play in a global context, some others in a more local environment. We address boths groups of scenarios with different methods of positioning (location providers). We are using a WLAN mesh network to determine the nodes' positions. We introduce a trustworthy hardware module used for positioning and controlling access to secured data. We show different types of attacks against such systems. Due to the special nature of different location providers we compare several ways how these attacks are impeded
Year
DOI
Venue
2006
10.1145/1163673.1163678
International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems
Keywords
Field
DocType
wlan mesh network,different location provider,location provider,controlling access,wlan positioning,authenticated positioning,communication channel,different type,mesh networks,location dependent access control,boths group,context/location awareness,global context,drm,authentication,manets,different method,mesh network,communication channels,access control
Mesh networking,Hybrid positioning system,Authentication,Computer science,Trustworthiness,Communication channel,Computer network,Access control
Conference
ISBN
Citations 
PageRank 
1-59593-486-3
4
0.79
References 
Authors
8
1
Name
Order
Citations
PageRank
Thomas Mundt15110.18