A Secure Framework for Location Verification in Pervasive Computing

被引:0
|
作者
Liu, Dawei [1 ]
Lee, Moon-Chuen [1 ]
Wu, Dan [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
引用
收藏
页码:388 / 397
页数:10
相关论文
共 50 条
  • [1] A Secure Framework to Support Service Discovery in Pervasive Computing
    Sharifi, Mandi
    Manaf, Azizah Abdul
    Tabatabaei, Sayed Gholam Hassan
    Movahednejad, Homa
    CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1368 - 1373
  • [2] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [3] PASPORT: A Secure and Private Location Proof Generation and Verification Framework
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Yu, Shui
    Grobler, Marthie
    Zhang, Jingwen
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (02): : 293 - 307
  • [4] A pervasive service framework for pervasive computing applications
    Zhang, Yong
    Zhang, Shensheng
    Han, Songqiao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 1024 - +
  • [5] A location model for pervasive computing environments
    Satoh, I
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
  • [6] Survey on location privacy in pervasive computing
    Görlach, A
    Heinemann, A
    Terpstra, WW
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
  • [7] Identity location decoupling in pervasive computing
    Herborn, S
    Boreli, R
    Seneviratne, A
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 610 - 615
  • [8] Blockchain for secure location verification
    Nosouhi, Mohammad Reza
    Yu, Shui
    Zhou, Wanlei
    Grobler, Marthie
    Keshtiar, Habiba
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 136 : 40 - 51
  • [9] Secure lightweight cryptosystem for IoT and pervasive computing
    Abutaha, Mohammed
    Atawneh, Basil
    Hammouri, Layla
    Kaddoum, Georges
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [10] Secure lightweight cryptosystem for IoT and pervasive computing
    Mohammed Abutaha
    Basil Atawneh
    Layla Hammouri
    Georges Kaddoum
    Scientific Reports, 12