Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services

A survey on location authentication protocols and spatial-temporal attestation services is presented. Several protocols and services with these objectives have been proposed during the last decade, but still there is a lack of understanding of the security properties they should provide and which security mechanisms are appropriate. We first define the goals and threat model of location authentication protocols, next they are described and analyzed against this model. Also, spatial-temporal attestation services are described and classified depending on their goal and kind of issued evidence.

[1]  Arturo Ribagorda,et al.  Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications , 2003, CAiSE Workshops.

[2]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[3]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[4]  Pascal Lorenz Networking — ICN 2001 , 2001, Lecture Notes in Computer Science.

[5]  Srdjan Capkun,et al.  Securing position and distance verification in wireless networks , 2004 .

[6]  Avishai Wool,et al.  On location-restricted services , 1999 .

[7]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[8]  Markus G. Kuhn,et al.  An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.

[9]  E. F. Michiels,et al.  ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .

[10]  Michael Kreutzer,et al.  Enhancing applications with approved location stamps , 2001, IEEE Intelligent Network 2001 Workshop. IN 2001 Conference Record (Cat. No.01TH8566).

[11]  Alf Zugenmaier,et al.  Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks , 2001, ICN.

[12]  Laurent Bussard Trust establishment protocols for communicating devices , 2004 .

[13]  Oscar Pozzobon,et al.  Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services , 2004 .

[14]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[15]  Nikolaos Michalakis Location-aware access control for pervasive computing environments , 2003 .

[16]  Tim Kindberg,et al.  Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[17]  Jin Nakazawa,et al.  LEXP: Preserving User Privacy and Certifying the Location Information , 2003 .