Skip to main content

GeoPKI: Converting Spatial Trust into Certificate Trust

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7868))

Included in the following conference series:

Abstract

The goal of GeoPKI is to enable secure certificate validation (without user interaction) for situations in which a user interacts with an online entity associated with the physical space where the the user trusts (and usually is currently located). GeoPKI enables the owner of a space to associate a certificate with that space, and enables space-based certificate lookup to set up a secure channel to the online resource associated with the space. Such a system enables several secure applications, such as secure authentication of paywall certificates at an airport or hotel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Certificate Authority Transparency and Auditability (2011), http://www.certificate-transparency.org

  2. Bayer, R., Markl, V.: The UB-Tree: Performance of Multidimensional Range Queries. Tech. rep., Institut für Informatik, TU München (1998)

    Google Scholar 

  3. Correia, M.M., Tok, M.: DNS-based Authentication of Named Entities (DANE). Tech. rep., Universidade do Porto (2011-2012)

    Google Scholar 

  4. Eckersley, P.: Sovereign Key Cryptography for Internet Domains, https://www.eff.org/sovereign-keys

  5. Guttman, A.: R-trees: A Dynamic Index Structure for Spatial Searching. In: International Conference on Management of Data, pp. 47–57. ACM (1984)

    Google Scholar 

  6. Hill, B.: CA T&A Proofs as Cert Extensions (2011), http://www.ietf.org/mail-archive/web/pkix/current/msg30146.html

  7. Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (November 2001)

    Google Scholar 

  8. Poovendran, R., Wang, C., Roy, S.: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer (2007)

    Google Scholar 

  9. Samet, H.: Octree Approximation and Compression Methods. In: Proc. of the 1st Intl. Symp. on 3D Data Processing Visualization and Transmission. pp. 460–469. IEEE Computer Society Press (2002)

    Google Scholar 

  10. ÄŒapkun, S., ÄŒagalj, M., Karame, G., Tippenhaur, N.O.: Integrity Regions: Authentication Through Presence in Wireless Networks. IEEE Transactions on Mobile Computing (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, T.HJ., Gligor, V., Perrig, A. (2013). GeoPKI: Converting Spatial Trust into Certificate Trust. In: De Capitani di Vimercati, S., Mitchell, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2012. Lecture Notes in Computer Science, vol 7868. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40012-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40011-7

  • Online ISBN: 978-3-642-40012-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics