Type: Research Paper
Year: 2003
This provided some analysis of threats against the geopriv protocol architecture. It Focused on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by geopriv. Some security properties that meet these threats are enumerated as a reference for geopriv requirements.