A Geo Time Authentication System

  • L. Mostarda
  • A. Tocchio
  • P. Inverardi
  • S. Costantini
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


In this paper we present Geo Time Authentication (GTA), a prototype system that provides authenticity and integrity of cultural assets information. It has been conceived in the context of the CUSPIS project and afterwards it has been generalized to the context of assets and goods where problems of counterfeiting and thefts are prevalent. To prevent these crimes GTA adds to the usual asset information an additional tag that contains Galileo geo time information and it extends digital certificates with the notion of geographical areas for protecting the origin and the authenticity of the assets. Moreover, GTA makes available several services to protect the assets transport.


Global Navigation Satellite System Certification Authority Cultural Asset Asset Information Digital Certificate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Augello A, Santangelo A, Sorce S, Pilato G, Gentile A, Genco A, Gaglio S. Maga: A mobile archaeological guide at agrigento. University of Palermo, ICAFLCNR.Google Scholar
  2. 2.
    Bailey D. and Juels A (2006) Shoehorning security into the EPC standard. In: De Prisco R, Yung M (eds) International Conference on Security in Communication Networks, volume 4116 of LNCS, pages 303–320, Springer-Verlag.Google Scholar
  3. 3.
    Caputo T. (2005) Rfid technology beyond wal-mart. WinesandVines.Google Scholar
  4. 4.
    EPC global standard powered by GS1 (2005) Object Naming Service (ONS) 5 Version 1.0. Whitepaper, standards/ Object_Naming_Service-ONS_Standard_Version_1.0.pdf EPCglobal Ratified Specification Version of October 4, 2005.
  5. 5.
    European Commision 6th Framework Program — 2nd Call Galileo Joint Undertaking. Cultural Heritage Space Identification System (CUSPIS).
  6. 6.
    Garfinkel S and Rosemberg B (2005) Hacking the prox card. In: RFID: Applications, Security and privacy, pages 291–300. MA: Addison-Wesley.Google Scholar
  7. 7.
    Juels A (2004) Minimalist cryptography for low-cost rfid tags. In: Proc. 4th International Conference on Security Communication Network, C. Blundo and C. Blundo, Eds. New York: Springer LNCS.Google Scholar
  8. 8.
    Juels A (2006) Rfid security and privacy: A research survey. IEEE Journal on Selected Areas in Communication.Google Scholar
  9. 9.
    Juels A, Molnar D, and Wagner D (2005) Security and privacy issues in epassports. In: Gollman D, Li G, Tsudik G, (eds) IEEE/CreateNet SecureComm.Google Scholar
  10. 10.
    official web page of Galileo.
  11. 11.
    Pozzobon O, Wullems C, Kubic K. (2004) Secure tracking using trusted gnss receivers and galileo authentication services. Journal of Global Positioning Systems.Google Scholar
  12. 12.
    Stallings W (2006) Cryptography and network security: Principles and Practice. Fourth edition, Prentice Hall (eds).Google Scholar
  13. 13.
    Texas Instruments and VeriSign, Inc. Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies. Whitepaper, rfid/ docs/ customer/ eped-form.shtml.
  14. 14.
  15. 15.
    web page of the Sea Smoke Cellars. 64.php.
  16. 16.
    web page of the TagStream Company.
  17. 17.
    web page on EPCglobal organization.
  18. 18.
    Jakobsson M and Wetzel S (2001). Security weakness in Bluetooth. volume 2020 of LNCS. Springer Verlang.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • L. Mostarda
    • 1
  • A. Tocchio
    • 1
  • P. Inverardi
    • 1
  • S. Costantini
    • 1
  1. 1.Dip. di InformaticaUniversità di L’AquilaL’AquilaItaly

Personalised recommendations