Trusted Location Based Services

被引:0
作者
Teufl, Peter [1 ]
Zefferer, Thomas [1 ]
Kreuzhuber, Sandra [1 ]
Lesjak, Christian M. [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
来源
2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS | 2012年
关键词
location based services; electronic signatures; NFe; smartphones; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are currently numerous smartphone-based applications that utilize the users' current positions to provide Location Based Services (LBS). In all of these applications it is in the interest of the user to submit as-accurate-as-possible position information in order to get the best of the service. However, there is yet hardly any service, which requires the user to prove that she is at a specific location at a certain point in time. The reason for the lack of such services lies in the fact that none of the position and time information gained by nowadays smartphones is trustworthy. In order to address this problem, this paper investigates the issues with the current systems and analyzes the basic requirements for trusted location information. Based on these results, we propose a smartphone-based solution relying on trusted third parties and qualified electronic signatures, which allows users to prove their current locations. The applicability of our solution is illustrated by means of two prototype implementations. Finally, the security of our solution and of the developed prototypes is assessed by a detailed security and risk analysis.
引用
收藏
页码:185 / 192
页数:8
相关论文
共 12 条
  • [1] [Anonymous], 2008, Proceedings of the 9th workshop on Mobile computing systems and applications
  • [2] [Anonymous], 2012, MOB MALW DEV CONT RI
  • [3] Geolocation and assisted GPS
    Djuknic, GM
    Richton, RE
    [J]. COMPUTER, 2001, 34 (02) : 123 - 125
  • [4] HUTTER M, 2010, RFIDSEC 2010, V6370, P189
  • [5] The global positioning system
    McNeff, JG
    [J]. IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, 2002, 50 (03) : 645 - 652
  • [6] Classifying RFID attacks and defenses
    Mitrokotsa, Aikaterini
    Rieback, Melanie R.
    Tanenbaum, Andrew S.
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
  • [7] Orthacker Clemens, 2010, P 25 TC 11 INT INF S
  • [8] Othman Hanunah, 2010, 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), P297, DOI 10.1109/ICCAIE.2010.5735093
  • [9] Papadimitratos Panagiotis., 2008, MILCOM 2008 2008 IEE, P1
  • [10] Schrooyen M., 2008, P ECUMICT GENT BELG