A Secure Framework for Location Verification in Pervasive Computing

被引:0
|
作者
Liu, Dawei [1 ]
Lee, Moon-Chuen [1 ]
Wu, Dan [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
引用
收藏
页码:388 / 397
页数:10
相关论文
共 50 条
  • [41] Secure Location Verification Using Simultaneous Multilateration
    Chiang, Jerry T.
    Haas, Jason J.
    Choi, Jihyuk
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) : 584 - 591
  • [42] Pervasive Computing Secure Application Models Based on Trust Algorithm
    Yong, Ting
    Qin, Jun
    Chen, Yanling
    Fang, Shanyao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 606 - 609
  • [43] Secure multi-mode systems and their applications for pervasive computing
    Park, Jong Hyuk
    Chen, Hsiao-Hwa
    Coronato, Antonio
    Kortuem, Gerd
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4232 - 4233
  • [44] Secure location verification using radio broadcast
    Vora, A
    Nesterenko, M
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 369 - 383
  • [45] Secure localization and location verification in sensor networks
    Lee, YH
    Phadke, V
    Lee, JW
    Deshmukh, A
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 278 - 287
  • [46] Secure location verification using radio broadcast
    Vora, Adnan
    Nesterenko, Mikhail
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 377 - 385
  • [47] Towards Secure Resource Sharing for Impromptu Collaboration in Pervasive Computing
    Claycomb, William
    Shin, Dongwan
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 940 - 946
  • [48] Verification Requirements for Secure and Reliable Cloud Computing
    Ghumman, Waheed Aslam
    Laessig, Jorg
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 143 - 150
  • [49] Physical Interaction in Pervasive Computing: Formal Modeling, Analysis and Verification
    Ishikawa, Fuyuki
    Suleiman, Basem
    Yamamoto, Kayoko
    Honiden, Shinichi
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES (ICPS 2009), 2009, : 133 - 140
  • [50] A Framework for Secure Mobile Cloud Computing
    Ramavathu, Lakshmananaik
    Bairam, Manjula
    Manchala, Sadanandam
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363