POSTER: Privacy Enhanced Secure Location Verification

被引:0
作者
Akand, Md Mamunur Rashid [1 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Location verification; In-region location verification; Privacy-enhanced location verification; Distance Bounding;
D O I
10.1145/2976749.2989066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a privacy enhanced location verification system that uses in-region location verification to verify if a location claim is from within an area specified by a policy. The novelty of our work is the use of distance bounding protocols to construct a pseudo-rectangle (P-rectangle) that optimizes coverage of the policy area, and uses it to verify the claim with respect to the P-rectangle, thereby minimizing error. We propose a privacy enhancement for the system that ensures that the prover's location cannot be inferred by an adversary who monitors protocol messages. We discuss our results and propose directions for future research.
引用
收藏
页码:1793 / 1795
页数:3
相关论文
共 50 条
[41]   An Efficient Location Verification Scheme for Static Wireless Sensor Networks [J].
Kim, In-hwan ;
Kim, Bo-sung ;
Song, JooSeok .
SENSORS, 2017, 17 (02)
[42]   A trusted neighbor table based location verification for VANET Routing [J].
Xue, Xiaoping ;
Lin, Nizhong ;
Ding, Jia ;
Ji, Yiwen .
ICWMMN 2010, PROCEEDINGS, 2010, :1-+
[43]   An Enhanced Secure Data Provenance Scheme for the Internet of Vehicles [J].
Nepal, Anuj ;
Doss, Robin ;
Jiang, Frank .
2024 6TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET, ICCCI 2024, 2024, :156-162
[44]   MSN: mutual secure neighbor verification in multi-hop wireless networks [J].
Khalil, Issa M. ;
Awad, M. ;
Bouktif, S. ;
Awwad, F. .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) :186-196
[45]   Location verification based defense against sybil attack in sensor networks [J].
Mukhopadhyay, Debapriyay ;
Saha, Indranil .
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 :509-521
[46]   Matching user accounts based on location verification across social networks [J].
Zhou, Xueyan ;
Yang, Jing .
REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2020, 36 (01)
[47]   Ranking-Based Attacks to In-Region Location Verification Systems [J].
Brighente, A. ;
Formaggio, F. ;
Ruvoletto, G. ;
Tomasin, S. .
2019 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2019,
[48]   Location-Verification and Network Planning via Machine Learning Approaches [J].
Brighente, Alessandro ;
Formaggio, Francesco ;
Centenaro, Marco ;
Di Nunzio, Giorgio Maria ;
Tomasin, Stefano .
17TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT 2019), 2019, :394-400
[49]   Location verification algorithm of wearable sensors for wireless body area networks [J].
Wang, Hua ;
Wen, Yingyou ;
Zhao, Dazhe .
TECHNOLOGY AND HEALTH CARE, 2018, 26 :S3-S18
[50]   SVNM: Secure Verification of Neighborhood Membership in Static Multi-hop Wireless Networks [J].
Khalil, Issa ;
Hayajneh, Mohammad ;
Awad, Mamoun .
ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, :367-372