Abstract
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Patwari, N., Ash, J., Kyperountas, S., Hero III, A., Moses, R., Correal, N.: Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Processing Magazine 22(4), 54–69 (2005)
Kokku, R., Sundaresan, K., Jiang, G.: Enabling location specific real-time mobile applications. In: Proceedings of ACM MobiArch, pp. 19–24 (2008)
Capkun, S., Rasmussen, K.C.M.S.M.: Secure Location Verification with Hidden and Mobile Base Stations. IEEE Transactions on Mobile Computing 7(4), 470–483 (2008)
Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. Proceedings of IEEE INFOCOM 2005 3, 1917–1928 (2005)
Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In: Proceedings of IEEE ICDCS, pp. 609–619 (2005)
Lazos, L., Poovendran, R.: SeRLoc: secure range-independent localization for wireless sensor networks. In: Proceedings of ACM Workshop on Wireless Security, pp. 21–30 (2004)
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 46–55 (2003)
Cong, L., Zhuang, W.: Hybrid TDOA/AOA mobile user location for wideband CDMA cellularsystems. IEEE Transactions on Wireless Communications 1(3), 439–447 (2002)
He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: Proceedings of ACM MobiCom, pp. 81–95 (2003)
Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of IEEE ICDCSÂ 25, 620 (2005)
Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM workshop on security of ad hoc and sensor networks, pp. 72–82 (2003)
Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of ACM workshop on security of ad hoc and sensor networks, pp. 29–42 (2004)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of ACM/IEEE IPSN, pp. 259–268 (2004)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 247–260 (2006)
Fontana, R.: Experimental results from an ultra wideband precision geolocation system. Ultra-Wideband, Short-Pulse Electromagnetics 5, 215–224 (2000)
Hazas, M., Kray, C., Gellersen, H., et al.: A relative positioning system for co-located mobile devices. In: Proceedings of ACM Mobisys, pp. 177–190 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, D., Lee, MC., Wu, D. (2009). A Secure Framework for Location Verification in Pervasive Computing. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)