Securing mobile location-based services through position verification leveraging key distribution

Jie Yang, Yingying Chen, Sanjay Macwan, Cristina Serban, Shu Chen, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Technological advancements have made it possible to use information associated with a mobile's location to form new computing and services. One concern with these emerging location-based services (LBS) is their ability to provide security while remaining reliable and accurate. In this paper, we focus on securing Mobile Location-based Services (MLBS), where certain goods or services are provided by mobile vendors to a clientele based on the proximity of vendors to potential customers. We identify different attacks and misuse faced by MLBS, and show that position verification is a critical step in providing a secure and trustworthy MLBS. To provide position verification, we propose a scheme called Key Distribution-based Position Verification (KEPI), which takes advantage of an auxiliary network of transponders to facilitate trustworthy location-based services. We derive an analytical model to evaluate our approach and our simulation results provide useful insights about how auxiliary networks can help provide trustworthy mobile services.

Original languageEnglish (US)
Title of host publication2012 IEEE Wireless Communications and Networking Conference, WCNC 2012
Pages2694-2699
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE Wireless Communications and Networking Conference, WCNC 2012 - Paris, France
Duration: Apr 1 2012Apr 4 2012

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

Other2012 IEEE Wireless Communications and Networking Conference, WCNC 2012
Country/TerritoryFrance
CityParis
Period4/1/124/4/12

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Securing mobile location-based services through position verification leveraging key distribution'. Together they form a unique fingerprint.

Cite this