geopriv-2----Page:15
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Security Framework
Threat model: Whom do we trust when it comes to obtaining location information?
Different types of adversaries need to be considered:
off-path
on-path
active
passive
PPT Version