Proceedings of the 2nd ACM International Workshop on Quality of Service &Amp; Security for Wireless and Mobile Networks 2006
DOI: 10.1145/1163673.1163678
|View full text |Cite
|
Sign up to set email alerts
|

Two methods of authenticated positioning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Although we notice that this attack is easy to carry out [16] and that there is no protection against it in current GPS receivers, it is possible to detect GPS spoofing attack by combining and analyzing location information gathered through both the GSM and the GPS networks. On mobile devices that do not provide the possibility to access a second source of location information (e.g., PDAs), several proposals have been made on how to fix this problem [4,10]. We hope that the next generation of GPS receivers will provide also authentication information to allow applications to recognize the level of trustworthiness of the signal (e.g., by using information about the time, noise level and strength's of the GPS signal, reported accelerations' sanity checks).…”
Section: Smart Phone Applicationmentioning
confidence: 99%
“…Although we notice that this attack is easy to carry out [16] and that there is no protection against it in current GPS receivers, it is possible to detect GPS spoofing attack by combining and analyzing location information gathered through both the GSM and the GPS networks. On mobile devices that do not provide the possibility to access a second source of location information (e.g., PDAs), several proposals have been made on how to fix this problem [4,10]. We hope that the next generation of GPS receivers will provide also authentication information to allow applications to recognize the level of trustworthiness of the signal (e.g., by using information about the time, noise level and strength's of the GPS signal, reported accelerations' sanity checks).…”
Section: Smart Phone Applicationmentioning
confidence: 99%
“…For access control decisions, we require the location of a mobile device to be verified such that a dishonest user cannot fake his or her location. Many such systems have been proposed, based on WiFi networks [3][4][5][6][7][8][9][10][11], GPS [8,[12][13][14][15][16], cellular telephone networks [13,15,[17][18][19], RFID [20] and other sensor networks [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…This requires the devices and AP(s) to have tightly synchronized clocks allowing for detection of large tunnelling times of packages (temporal leash). Mundt defines a system that can be used with WLAN mesh networks to authenticate APs and prevent tunnelling or wormhole attacks in his paper [7]. In this system each AP is assumed capable of two-way communication and in possession of a public/private key-pair.…”
Section: B Wormhole Attacksmentioning
confidence: 99%
“…While GPS-based systems such as Mundt's [7] have similar properties, GPS signals cannot penetrate buildings and WiFi-based systems are more effective in this context.…”
Section: Introductionmentioning
confidence: 99%