Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514301
|View full text |Cite
|
Sign up to set email alerts
|

Secure and precise location verification using distance bounding and simultaneous multilateration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(53 citation statements)
references
References 12 publications
0
53
0
Order By: Relevance
“…Neighbor position verification was studied in the context of ad-hoc and sensor networks; however, existing NPV schemes often rely on fixed [5], [6] or mobile [7] trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In [8], an NPV protocol is proposed that first lets nodes calculate distances to all neighbors, and then commends that all triplets of nodes encircling a pair of other nodes act as verifiers of the pair's positions [2].…”
Section: Related Workmentioning
confidence: 99%
“…Neighbor position verification was studied in the context of ad-hoc and sensor networks; however, existing NPV schemes often rely on fixed [5], [6] or mobile [7] trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In [8], an NPV protocol is proposed that first lets nodes calculate distances to all neighbors, and then commends that all triplets of nodes encircling a pair of other nodes act as verifiers of the pair's positions [2].…”
Section: Related Workmentioning
confidence: 99%
“…Multilateration scheme [3] is used to verify the prover's location. In this scheme verifier and prover is mainly used.…”
Section: Bmentioning
confidence: 99%
“…For example a malicious user is able to send fake GPS coordinates. In order to solve this problem, the use of trusted computing hardware-such as Trusted Platform Module(TPM) [12]-and the implementation of distant bounding protocols-such as in [13]-will be considered. Finally a version of our architecture compatible with the ONS service will be considered…”
Section: Related Workmentioning
confidence: 99%