geopriv-2----Page:15
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17 

Security Framework
Threat model: Whom do we trust when it comes to obtaining location information?

Different types of adversaries need to be considered:
off-path
on-path
active
passive
PPT Version