A Secure Framework for Location Verification in Pervasive Computing

被引:0
|
作者
Liu, Dawei [1 ]
Lee, Moon-Chuen [1 ]
Wu, Dan [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
引用
收藏
页码:388 / 397
页数:10
相关论文
共 50 条
  • [21] Secure and Private Service Discovery in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 107 - 122
  • [22] Towards Secure Trust Bootstrapping in Pervasive Computing Environment
    Ahamed, Sheikh I.
    Hoque, Endadul
    Rahman, Farzana
    Zulkernine, Mohammad
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 89 - +
  • [23] Secure pervasive computing without a Trusted Third Party
    Pirzada, AA
    McDonald, C
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
  • [24] A semantic context-aware access control framework pp for secure collaborations in pervasive computing environments
    Toninelli, Alessandra
    Montanari, Rebecca
    Kagal, Lalana
    Lassila, Ora
    Semantic Web - ISEC 2006, Proceedings, 2006, 4273 : 473 - 486
  • [25] Formal verification of context and situation models in pervasive computing
    Boytsov, Andrey
    Zaslavsky, Arkady
    PERVASIVE AND MOBILE COMPUTING, 2013, 9 (01) : 98 - 117
  • [26] A framework for secure enterprise computing
    Kang, MH
    Froscher, JN
    IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 219 - 220
  • [27] Enabling Location Privacy in Pervasive Computing by Fragmenting Location Information of Users
    Jacob, Jeeva Susan
    Preetha, K. G.
    ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 364 - 371
  • [28] A network service framework for mobile pervasive computing
    Chen, EY
    Shi, YC
    Xu, GY
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 839 - 845
  • [29] The Framework of City Informationization Based on Pervasive Computing
    Liu Dan
    Zhang Zhonghui
    Lv Tingjie
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 317 - 320
  • [30] AnyCom: A component framework optimization for pervasive computing
    Chen, WZ
    Jiang, Z
    Wu, ZH
    EMBEDDED SOFTWARE AND SYSTEMS, 2005, 3605 : 236 - 242