Guaranteeingauthenticity of Location information

[1]  Laurent Bussard Trust establishment protocols for communicating devices , 2004 .

[2]  Markus G. Kuhn,et al.  An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.

[3]  O. Pozzobon,et al.  TRUST YOUR RECEIVER? ENHANCING LOCATION SECURITY , 2004 .

[4]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  Klaus Kursawe,et al.  Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services , 2005, EUC Workshops.

[6]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[7]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  Richard R. Muntz,et al.  Challenges in Location-Aware Computing , 2003, IEEE Pervasive Comput..

[10]  Radha Poovendran,et al.  Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.

[11]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[13]  Markus G. Kuhn,et al.  So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.

[14]  Juan Manuel González Nieto,et al.  Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.

[15]  Prathima Agrawal,et al.  Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[17]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[18]  Tim Kindberg,et al.  Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[19]  Dorothy E. Denning,et al.  Location-based authentication: Grounding cyberspace for better security , 1996 .

[20]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.