Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

被引:0
作者
Graham, Michelle [1 ]
Gray, David [1 ]
机构
[1] Dublin City Univ, Sch Comp, Dublin 9, Ireland
来源
SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS | 2009年 / 17卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.
引用
收藏
页码:160 / 171
页数:12
相关论文
共 20 条
  • [1] [Anonymous], THEORY APPL CRYPTOGR
  • [2] [Anonymous], COMP SEC FDN WORKSH
  • [3] [Anonymous], E REALITY CONSTRUCTI
  • [4] *ASS IS, 1999, IEEE STAND INF TE 11
  • [5] A THEORY OF COMMUNICATING SEQUENTIAL PROCESSES
    BROOKES, SD
    HOARE, CAR
    ROSCOE, AW
    [J]. JOURNAL OF THE ACM, 1984, 31 (03) : 560 - 599
  • [6] CAPKUN S, 2006, WISE 06, P1
  • [7] Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
  • [8] DESMEDT Y, 1988, P 6 WORLDW C COMP CO, P147
  • [9] Gabber E., 1998, CCS 1998, P142
  • [10] Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    Gruteser, M
    Grunwald, D
    [J]. MOBILE NETWORKS & APPLICATIONS, 2005, 10 (03) : 315 - 325