A Secure Framework for Location Verification in Pervasive Computing

被引:0
|
作者
Liu, Dawei [1 ]
Lee, Moon-Chuen [1 ]
Wu, Dan [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
引用
收藏
页码:388 / 397
页数:10
相关论文
共 50 条
  • [31] Secure Framework for Data access Using Location Based Service in Mobile Cloud Computing
    Goyal, Deepanshu
    Krishna, M. Bala
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [32] Security clustering: A network-wide secure computing mechanism in pervasive computing
    Gu, J
    Park, S
    Nah, J
    Sohn, S
    Song, O
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1326 - 1331
  • [33] A Location Algorithm Integrating GPS and WSN in Pervasive Computing
    Xu, Lianming
    Deng, Zhongliang
    Ren, Weizheng
    Wang, Hui
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 463 - 468
  • [34] Location-detection strategies in pervasive computing environments
    Fischmeister, S
    Menkhaus, G
    Stumpfl, A
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 273 - 278
  • [35] A Homogeneous Service Framework for Pervasive Computing Environments
    Department of Informatics, University of Fribourg, Chemin du Musée 3, Fribourg
    1700, Switzerland
    Lect. Notes Informatics (LNI), Proc. - Series Ges. Inform. (GI), (472-491):
  • [36] A Mobile Computing Framework for Pervasive Adaptive Platforms
    Brousse, Olivier
    Guillot, Jeremie
    Sassatelli, Gilles
    Gil, Thierry
    Grize, Francois
    Robert, Michel
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [37] Multilevel Trust Management Framework for Pervasive Computing
    Zhong Dong
    Zhu Yian
    Lei Wanbao
    Gu Jianhua
    Wang Yunlan
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 159 - 162
  • [38] Location-Aware Middle Agents in Pervasive Computing
    Sashima, Akio
    Izumi, Noriaki
    Kurumatani, Koichi
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2007, 2 (02) : 149 - +
  • [39] Location-aware middle agents in pervasive computing
    Sashima, A
    Izumi, N
    Kurumatani, K
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 820 - 826
  • [40] POSTER: Privacy Enhanced Secure Location Verification
    Akand, Md Mamunur Rashid
    Safavi-Naini, Reihaneh
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1793 - 1795