메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 72-80

Guaranteeing the authenticity of location information

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION MEDIUM; DATA ORIGIN AUTHENTICATION; EFFECTIVE MEASURING; ENTITY AUTHENTICATIONS; LOCATION DETERMINATION; LOCATION INFORMATION; LOCATION VERIFICATION; POSSIBLE SOLUTIONS; SECURE LOCATION; THREAT MODELING;

EID: 48049111552     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2008.49     Document Type: Article
Times cited : (19)

References (24)
  • 4
    • 33744932197 scopus 로고    scopus 로고
    • Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services
    • Springer
    • A.I. González-Tablas et al., "Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services," Proc. IFIP Int'l Symp. Network-Centric Ubiquitous Systems, Springer, 2005, pp. 797-806.
    • (2005) Proc. IFIP Int'l Symp. Network-Centric Ubiquitous Systems , pp. 797-806
    • González-Tablas, A.I.1
  • 5
    • 0035424017 scopus 로고    scopus 로고
    • Location Systems for Ubiquitous Computing
    • J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, 2001, pp. 57-66.
    • (2001) Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Borriello, G.2
  • 9
    • 33750318709 scopus 로고    scopus 로고
    • Proving the Location of Tamper-Resistant Devices
    • TR-667-03, Computer Science Dept, Princeton Univ
    • B.R. Waters and E.W. Felten, Proving the Location of Tamper-Resistant Devices, tech. report TR-667-03, Computer Science Dept., Princeton Univ., 2003.
    • (2003) tech. report
    • Waters, B.R.1    Felten, E.W.2
  • 10
    • 48049123711 scopus 로고    scopus 로고
    • L. Bussard, Trust Establishment Protocols for Communicating Devices, doctoral dissertation, Institut Eurécom Télécom Paris, 2004.
    • L. Bussard, "Trust Establishment Protocols for Communicating Devices," doctoral dissertation, Institut Eurécom Télécom Paris, 2004.
  • 14
    • 33144454801 scopus 로고    scopus 로고
    • Securing Positioning in Wireless Networks
    • S. Čapkun and J.P. Hubaux, "Securing Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, 2006, pp. 221-232.
    • (2006) IEEE J. Selected Areas in Comm , vol.24 , Issue.2 , pp. 221-232
    • Čapkun, S.1    Hubaux, J.P.2
  • 15
    • 8744283509 scopus 로고    scopus 로고
    • Trust Your Receiver? Enhancing Location Security
    • Oct
    • C. Wullems, O. Pozzobon, and K. Kubik, "Trust Your Receiver? Enhancing Location Security," GPS World, Oct. 2004, pp. 23-30.
    • (2004) GPS World , pp. 23-30
    • Wullems, C.1    Pozzobon, O.2    Kubik, K.3
  • 16
    • 35048826237 scopus 로고    scopus 로고
    • An Asymmetric Security Mechanism for Navigation Signals
    • Springer
    • M. Kuhn, "An Asymmetric Security Mechanism for Navigation Signals," Proc. 6th Information and Hiding Workshop, Springer, 2004, pp. 239-252.
    • (2004) Proc. 6th Information and Hiding Workshop , pp. 239-252
    • Kuhn, M.1
  • 18
    • 33144467507 scopus 로고    scopus 로고
    • Robust Statistical Methods for Securing Wireless Localization in Sensor Networks
    • IEEE Press
    • Z. Li et al., "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks," Proc. 4th Int'l Conf. Information Processing in Sensor Networks, IEEE Press, 2005, pp. 91-98.
    • (2005) Proc. 4th Int'l Conf. Information Processing in Sensor Networks , pp. 91-98
    • Li, Z.1
  • 19
  • 21
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Robust Localization for Wireless Sensor Networks
    • ACM Press
    • L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 21-30.
    • (2004) Proc. ACM Workshop Wireless Security , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 22
    • 48049111825 scopus 로고    scopus 로고
    • SLAT: Secure Localization with Attack Tolerance
    • NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng, Pennsylvania State Univ
    • M. Pirreti et al., SLAT: Secure Localization with Attack Tolerance, tech. report NAS-TR-0024-2005, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ., 2005.
    • (2005) tech. report
    • Pirreti, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.