Abstract
The goal of GeoPKI is to enable secure certificate validation (without user interaction) for situations in which a user interacts with an online entity associated with the physical space where the the user trusts (and usually is currently located). GeoPKI enables the owner of a space to associate a certificate with that space, and enables space-based certificate lookup to set up a secure channel to the online resource associated with the space. Such a system enables several secure applications, such as secure authentication of paywall certificates at an airport or hotel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Certificate Authority Transparency and Auditability (2011), http://www.certificate-transparency.org
Bayer, R., Markl, V.: The UB-Tree: Performance of Multidimensional Range Queries. Tech. rep., Institut für Informatik, TU München (1998)
Correia, M.M., Tok, M.: DNS-based Authentication of Named Entities (DANE). Tech. rep., Universidade do Porto (2011-2012)
Eckersley, P.: Sovereign Key Cryptography for Internet Domains, https://www.eff.org/sovereign-keys
Guttman, A.: R-trees: A Dynamic Index Structure for Spatial Searching. In: International Conference on Management of Data, pp. 47–57. ACM (1984)
Hill, B.: CA T&A Proofs as Cert Extensions (2011), http://www.ietf.org/mail-archive/web/pkix/current/msg30146.html
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (November 2001)
Poovendran, R., Wang, C., Roy, S.: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer (2007)
Samet, H.: Octree Approximation and Compression Methods. In: Proc. of the 1st Intl. Symp. on 3D Data Processing Visualization and Transmission. pp. 460–469. IEEE Computer Society Press (2002)
ÄŒapkun, S., ÄŒagalj, M., Karame, G., Tippenhaur, N.O.: Integrity Regions: Authentication Through Presence in Wireless Networks. IEEE Transactions on Mobile Computing (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, T.HJ., Gligor, V., Perrig, A. (2013). GeoPKI: Converting Spatial Trust into Certificate Trust. In: De Capitani di Vimercati, S., Mitchell, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2012. Lecture Notes in Computer Science, vol 7868. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-40012-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40011-7
Online ISBN: 978-3-642-40012-4
eBook Packages: Computer ScienceComputer Science (R0)