skip to main content
10.1145/2766498.2774988acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Security by mobility in location and track verification

Published: 22 June 2015 Publication History

Abstract

This poster presents the idea of exploiting mobility to improve the security in location and track verification. Unlike traditional approaches which require tight time synchronization or two-way communication, mobility can be used to derive lightweight verification schemes. By ensuring independent movement of the verifiers, our scheme can provide security guarantees even if the verifiers' positions are known to the attacker. We also give an outlook on more general opportunities for mobility-aided security.

References

[1]
Matthias Schäfer, Vincent Lenders, and Jens B. Schmitt. Secure track verification. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2015.
[2]
Srdjan Čapkun, Jean-Pierre Hubaux, and Levente Buttyán. Mobility helps security in ad hoc networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pages 46--56, 2003.
[3]
Srdjan Čapkun, Kasper Rasmussen, Mario Čagalj, and Mani Srivastava. Secure location verification with hidden and mobile base stations. IEEE Transactions on Mobile Computing, 7(4):470--483, April 2008.
[4]
Jun Luo, Hersh V. Shukla, and Jean-Pierre Hubaux. Non-interactive location surveying for sensor networks with mobility-differentiated toa. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1--12, April 2006.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
June 2015
256 pages
ISBN:9781450336239
DOI:10.1145/2766498
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2015

Check for updates

Qualifiers

  • Poster

Conference

WiSec'15
Sponsor:
  • SIGSAC
  • US Army Research Office
  • NSF

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 128
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media