P. Bahl and V. N. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.775-784, 2000.
DOI : 10.1109/INFCOM.2000.832252

S. Brands and D. Chaum, Distance-Bounding Protocols, EUROCRYPT '93, pp.344-359, 1994.
DOI : 10.1007/3-540-48285-7_30

S. Capkun, L. Buttyan, and J. P. Hubaux, SECTOR: Secure tracking of node encounters in multi-hop wireless networks, Proceedings of the ACM Workshop on Security of Ad hoc and Sensor Networks (SASN), 2003.

D. E. Denning and P. F. Macdoran, Location-based authentication: Grounding cyberspace for better security, Computer Fraud & Security, vol.1996, issue.2, 1996.
DOI : 10.1016/S1361-3723(97)82613-9

J. D. Guttman and F. J. Thayer-fábrega, Authentication tests and the structure of bundles, Theoretical Computer Science, vol.283, issue.2, pp.333-380, 2002.
DOI : 10.1016/S0304-3975(01)00139-6

B. Hofmann-wellenhof, H. Lichtenegger, and J. Collins, The Global Positioning System: Theory and Practice, 20014.

C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson, Distance bounding protocols: Authentication logic analysis and collusion attacks, Advances in Information Security, pp.279-298, 2007.
DOI : 10.1007/978-0-387-46276-9_12

URL : http://www.ee.washington.edu/research/nsl/papers/book-2006-ch-2.pdf

R. Poovendran, C. Wang, and S. Roy, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Advances in Information Security, 2007.
DOI : 10.1007/978-0-387-46276-9

N. B. Priyantha, A. K. Miu, H. Balakrishnan, and S. J. Teller, The cricket compass for context-aware mobile applications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.1-14, 2001.
DOI : 10.1145/381677.381679

N. Sastry, U. Shankar, and D. Wagner, Secure verification of location claims, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, 2003.
DOI : 10.1145/941311.941313

F. J. Thayer-fábrega, J. C. Herzog, and J. D. Guttman, Strand spaces: proving security protocols correct, Journal of Computer Security, vol.7, issue.2-3, pp.191-230, 1999.
DOI : 10.3233/JCS-1999-72-304