skip to main content
10.1145/1163673.1163678acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Two methods of authenticated positioning

Published: 02 October 2006 Publication History

Abstract

Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept and two architectures for location dependent access control. We start with a number of scenarios. Some of the scenarios play in a global context, some others in a more local environment. We address boths groups of scenarios with different methods of positioning (location providers). We are using a WLAN mesh network to determine the nodes' positions. We introduce a trustworthy hardware module used for positioning and controlling access to secured data. We show different types of attacks against such systems. Due to the special nature of different location providers we compare several ways how these attacks are impeded

References

[1]
The Opennet Rostock. "http://www.opennet-forum.de/".
[2]
Dream multimedia. "http://www.dream-multimedia-tv.de/", 2004.
[3]
J. Feigenbaum. Security and Privacy in Digital Rights Management. Springer, Heidelberg, 2003.
[4]
Guenter W. Hein, Jeremie Godet, Jean-Luc Issler, Jean-Christophe Martin, Philippe Erhard, Rafael Lucas-Rodriguez, and Tony Pratt. Status of galileo frequency and signal design, 2002. http://europa.eu.int/comm/dgs/energy_transport/galileo/doc/galileo_stf_ion2002.pdf.
[5]
Ray Hunt. PKI and Digital Certification Infrastructure. In Proc. of the Ninth IEEE International Conference on Networks (ICON 01), Bangkok, 2001. IEEE Press.
[6]
Seigo Ito and Nobuo Kawaguchi. Bayesian based location estimation system using wireless lan. In In Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), Kauai, Hawaii, March 2005. IEEE Press.
[7]
Burt Kaliski. A survey of encryption standards. IEEE Micro, (6):74--81, November/December 1993.
[8]
Elliott D. Kaplan. Understanding GPS: Principles and Applications. Artech House Publishers, Norwood, 1996.
[9]
Teruaki Kitasuka, Tsuneo Nakanishi, and Akira Fukuda. Wireless lan based indoor positioning system wips and its simulation. In In Proc. of The 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM'03), Victoria, BC., August 2003. IEEE Press.
[10]
J. Kelsey, B. Schneier, and Ch. Hall. An authenticated camera. In Proc. of the 12th Annual Computer Society Applications Conference (ACSAC). ACM Press, december 1996.
[11]
M. Ljubich. Methods for Enhancing the Security of Java Card based Payment Protocols. PhD thesis, University of Rostock, Rostock, Germany, 2004.
[12]
Thomas Mundt. Location depdendent digital rights management. In Proc. of 10th IEEE Symposium on Computers and Communications, La Manga del Mar Menor, 2005.
[13]
P. Myllymaki, T. Roos, H. Tirri, P. Misikangas, and J. Sievanen. A probabilistic approach to wlan user location estimation. In Proc. of the 3rd IEEE Workshop on Wireless LANs, Bonn, Germany, September 2001. IEEE Press.
[14]
O. Onidi. Galileo is launched, 2002. http://europa.eu.int/comm/dgs/energy_transport/galileo/doc/galileo_is_launched.pdf.
[15]
U. Reimers. Digital Video Broadcasting (DVB). The International Standard for Digital Television. Springer, Heidelberg, 2000.
[16]
Rainer Sasum and Thomas Mundt. Assessment and comparison of radio network based positioning technologies. Technical report, University of Rostock, August 2005.
[17]
Bill Schilit, Anthony LaMarca, Gaetano Borriello, William Griswold, David McDonald, Edward Lazowska, Anand Balachandran, Jason Hong, and Vaughn Iverson. Challenge: Ubiquitous location-aware computing and the place lab initiative. In In Proc. of The First ACM International Workshop on Wireless Mobile Applications and Services on WLAN (WMASH 2003), San Diego, CA, September 2003. ACM Press.
[18]
Vinay Seshadri, Gergely V. Zaruba, and Manfred Huber. A bayesian sampling approach to in-door localization of wireless devices using received signal strength indication. In In Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), Kauai, Hawaii, March 2005. IEEE Press.
[19]
K. Shimada. Patent US 5,922,073: System and method for controlling access to subject data using location data associated with the subject data and a requesting device, 1999.
[20]
The European Commission. Mission high level definition, 2002. http://europa.eu.int/comm/dgs/energy_transport/galileo/doc/galileo_hld_v3_23_09_02.pdf.
[21]
J. R. Vig. Introduction to quartz frequency standards. Technical report, Army Research Laboratory, October 2002.
[22]
W. Rosenblatt et.al. Digital Rights Management: Business and Technology. John Wiley and Sons, New York, 2001.
[23]
J. S. Warner and R. G. Johnston. GPS Spoofing Countermeasures. http://www.homelandsecurity.org/bulletin/Dual Benefit/warner_gps_spoofing.html, 2003.

Cited By

View all
  • (2017)Securing the positioning signals of autonomous vehicles2017 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2017.8258493(4522-4528)Online publication date: Dec-2017
  • (2015)Emerging attacks on VANET security based on GPS Time Spoofing2015 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2015.7346845(344-352)Online publication date: Sep-2015
  • (2011)Location-Aware Access Control for Mobile Workflow SystemsWeb Engineered Applications for Evolving Organizations10.4018/978-1-60960-523-0.ch004(44-62)Online publication date: 2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
October 2006
146 pages
ISBN:1595934863
DOI:10.1145/1163673
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DRM
  2. MANETs
  3. WLAN positioning
  4. authentication
  5. context/location awareness
  6. mesh networks

Qualifiers

  • Article

Conference

MSWiM06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 46 of 131 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Securing the positioning signals of autonomous vehicles2017 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2017.8258493(4522-4528)Online publication date: Dec-2017
  • (2015)Emerging attacks on VANET security based on GPS Time Spoofing2015 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2015.7346845(344-352)Online publication date: Sep-2015
  • (2011)Location-Aware Access Control for Mobile Workflow SystemsWeb Engineered Applications for Evolving Organizations10.4018/978-1-60960-523-0.ch004(44-62)Online publication date: 2011
  • (2010)PorKIProceedings of the 7th European conference on Public key infrastructures, services and applications10.5555/2035155.2035157(1-16)Online publication date: 23-Sep-2010
  • (2009)A survey of indoor positioning systems for wireless personal networksIEEE Communications Surveys & Tutorials10.1109/SURV.2009.09010311:1(13-32)Online publication date: 1-Jan-2009
  • (2008)A Security Model for Mobile ProcessesProceedings of the 2008 7th International Conference on Mobile Business10.1109/ICMB.2008.13(211-220)Online publication date: 7-Jul-2008
  • (2008)Location constraints in digital rights managementComputer Communications10.1016/j.comcom.2008.01.00831:6(1173-1180)Online publication date: 1-Apr-2008
  • (2007)Location-based DRM using WiFi access points2007 International Symposium on Communications and Information Technologies10.1109/ISCIT.2007.4392140(882-886)Online publication date: Oct-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media