TY - GEN
T1 - Securing mobile location-based services through position verification leveraging key distribution
AU - Yang, Jie
AU - Chen, Yingying
AU - Macwan, Sanjay
AU - Serban, Cristina
AU - Chen, Shu
AU - Trappe, Wade
PY - 2012
Y1 - 2012
N2 - Technological advancements have made it possible to use information associated with a mobile's location to form new computing and services. One concern with these emerging location-based services (LBS) is their ability to provide security while remaining reliable and accurate. In this paper, we focus on securing Mobile Location-based Services (MLBS), where certain goods or services are provided by mobile vendors to a clientele based on the proximity of vendors to potential customers. We identify different attacks and misuse faced by MLBS, and show that position verification is a critical step in providing a secure and trustworthy MLBS. To provide position verification, we propose a scheme called Key Distribution-based Position Verification (KEPI), which takes advantage of an auxiliary network of transponders to facilitate trustworthy location-based services. We derive an analytical model to evaluate our approach and our simulation results provide useful insights about how auxiliary networks can help provide trustworthy mobile services.
AB - Technological advancements have made it possible to use information associated with a mobile's location to form new computing and services. One concern with these emerging location-based services (LBS) is their ability to provide security while remaining reliable and accurate. In this paper, we focus on securing Mobile Location-based Services (MLBS), where certain goods or services are provided by mobile vendors to a clientele based on the proximity of vendors to potential customers. We identify different attacks and misuse faced by MLBS, and show that position verification is a critical step in providing a secure and trustworthy MLBS. To provide position verification, we propose a scheme called Key Distribution-based Position Verification (KEPI), which takes advantage of an auxiliary network of transponders to facilitate trustworthy location-based services. We derive an analytical model to evaluate our approach and our simulation results provide useful insights about how auxiliary networks can help provide trustworthy mobile services.
UR - http://www.scopus.com/inward/record.url?scp=84864358270&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864358270&partnerID=8YFLogxK
U2 - 10.1109/WCNC.2012.6214257
DO - 10.1109/WCNC.2012.6214257
M3 - Conference contribution
AN - SCOPUS:84864358270
SN - 9781467304375
T3 - IEEE Wireless Communications and Networking Conference, WCNC
SP - 2694
EP - 2699
BT - 2012 IEEE Wireless Communications and Networking Conference, WCNC 2012
T2 - 2012 IEEE Wireless Communications and Networking Conference, WCNC 2012
Y2 - 1 April 2012 through 4 April 2012
ER -