Secure verification of location claims

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is… CONTINUE READING

7 Figures & Tables

Topics

Statistics

050'02'04'06'08'10'12'14'16'18
Citations per Year

733 Citations

Semantic Scholar estimates that this publication has 733 citations based on the available data.

See our FAQ for additional information.