Skip to main content

A Secure Framework for Location Verification in Pervasive Computing

  • Conference paper
  • 921 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5682))

Abstract

The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Patwari, N., Ash, J., Kyperountas, S., Hero III, A., Moses, R., Correal, N.: Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Processing Magazine 22(4), 54–69 (2005)

    Article  Google Scholar 

  2. Kokku, R., Sundaresan, K., Jiang, G.: Enabling location specific real-time mobile applications. In: Proceedings of ACM MobiArch, pp. 19–24 (2008)

    Google Scholar 

  3. Capkun, S., Rasmussen, K.C.M.S.M.: Secure Location Verification with Hidden and Mobile Base Stations. IEEE Transactions on Mobile Computing 7(4), 470–483 (2008)

    Article  Google Scholar 

  4. Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. Proceedings of IEEE INFOCOM 2005 3, 1917–1928 (2005)

    Article  Google Scholar 

  5. Liu, D., Ning, P., Du, W.: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In: Proceedings of IEEE ICDCS, pp. 609–619 (2005)

    Google Scholar 

  6. Lazos, L., Poovendran, R.: SeRLoc: secure range-independent localization for wireless sensor networks. In: Proceedings of ACM Workshop on Wireless Security, pp. 21–30 (2004)

    Google Scholar 

  7. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 46–55 (2003)

    Google Scholar 

  8. Cong, L., Zhuang, W.: Hybrid TDOA/AOA mobile user location for wideband CDMA cellularsystems. IEEE Transactions on Wireless Communications 1(3), 439–447 (2002)

    Article  Google Scholar 

  9. He, T., Huang, C., Blum, B., Stankovic, J., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: Proceedings of ACM MobiCom, pp. 81–95 (2003)

    Google Scholar 

  10. Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of IEEE ICDCS 25, 620 (2005)

    Google Scholar 

  11. Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM workshop on security of ad hoc and sensor networks, pp. 72–82 (2003)

    Google Scholar 

  12. Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of ACM workshop on security of ad hoc and sensor networks, pp. 29–42 (2004)

    Google Scholar 

  13. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of ACM/IEEE IPSN, pp. 259–268 (2004)

    Google Scholar 

  14. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 247–260 (2006)

    Article  Google Scholar 

  15. Fontana, R.: Experimental results from an ultra wideband precision geolocation system. Ultra-Wideband, Short-Pulse Electromagnetics 5, 215–224 (2000)

    Google Scholar 

  16. Hazas, M., Kray, C., Gellersen, H., et al.: A relative positioning system for co-located mobile devices. In: Proceedings of ACM Mobisys, pp. 177–190 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, D., Lee, MC., Wu, D. (2009). A Secure Framework for Location Verification in Pervasive Computing. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03417-6_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03416-9

  • Online ISBN: 978-3-642-03417-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics