Abstract
This paper describes the open security architecture for LBS (Location- based Services) platform ensuring interoperability among the wireless networks and various location-based application services and the functional security requirements for the LBS platform. The goal of this paper is to investigate how well the most limited wireless devices can make use of LBS security services. In this paper, we suggest security acceleration methods for high speed open LBS using XML signcryption mechanism. And proposed secure LBS security protocols allows a client to offload mobile certificate handling to the server and to enable the central administration of privacy polices. The idea is to create a signcryption technique for software based XML signature acceleration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP, RFC 2560 (1999)
Park, N., et al.: The Security Consideration and Guideline for Open LBS using XML Security Mechanism. ASTAP 04/FR08/EG.IS/06 (2004)
Naor, M., Nissim, K.: Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications 18(4) (2000)
Nakamur, Y., et al.: Toward the Integration of web services security on enterprise environments. In: IEEE SAINT 2002 (2002)
Lee, S., et al.: TY*SecureWS:An integrated Web Service Security Solution based on java. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 186–195. Springer, Heidelberg (2003)
Lee, M., et al.: A Secure Web Services for Location based Services in Wireless Networks. Networking 2004 (2004)
Han, W.Y., et al.: A Gateway and Framework for Telematics Systems Independent on Mobile Networks. ETRI Journal 27(1), 106–109 (2005)
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)
Baek, J.H., et al.: An Enhanced Location-Based Location Update Scheme in Mobile Cellular Networks. ETRI Journal 27(4), 457–460 (2005)
Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4), 465–468 (2005)
Park, N., et al.: XKMS-based key management for open LBS in web services environment. In: Szczepaniak, P.S., Kacprzyk, J., Niewiadomski, A. (eds.) AWIC 2005. LNCS (LNAI), vol. 3528, pp. 367–373. Springer, Heidelberg (2005)
Ha, Y.-G., et al.: Towards Ubiquitous Robotic Companion: Design and Implementation of Ubiquitous Robotic Service Framework. ETRI Journal 27(6), 666–676 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, N., Kim, H., Chung, K., Sohn, S., Won, D. (2006). XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_27
Download citation
DOI: https://doi.org/10.1007/11751649_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34079-9
Online ISBN: 978-3-540-34080-5
eBook Packages: Computer ScienceComputer Science (R0)