A secure framework for location verification in pervasive computing

Dawei Liu*, Moon Chuen Lee, Dan Wu

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 4th International Conference, WASA 2009, Proceedings
Pages388-397
Number of pages10
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event4th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009 - Boston, MA, United States
Duration: 16 Aug 200918 Aug 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5682 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009
Country/TerritoryUnited States
CityBoston, MA
Period16/08/0918/08/09

Fingerprint

Dive into the research topics of 'A secure framework for location verification in pervasive computing'. Together they form a unique fingerprint.

Cite this