On the security of distributed position services

被引:2
|
作者
Wu, XX [1 ]
Nita-Rotaru, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/SECURECOMM.2005.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Position-based routing protocols make routing decisions based on the geographical position of the destination of a packet. Such protocols scale well since they do not require nodes to maintain explicit routes. Instead each node must know only its own position, the position of its neighbors, and the position of the destination. Thus, a critical component of position-based routing protocols is the position service that allows nodes to obtain the position of a destination node. In this paper we analyze the security vulnerabilities of position-based routing protocols and virtual home region (VHR)-based distributed position service systems. We propose methods to protect the position information from both external and internal attackers. We then discuss and propose several mitigation mechanisms against position abuse by internal attackers that exploit the position service to trace their targets. Finally, we propose a position verification mechanism that allows the position service to verify that the positions reported by nodes are correct.
引用
收藏
页码:35 / 44
页数:10
相关论文
共 50 条
  • [21] SECURITY FOR DISTRIBUTED SYSTEMS
    TRUEMAN, P
    DATA PROCESSING, 1986, 28 (04): : 187 - 190
  • [22] Security for grid services
    Welch, V
    Siebenlist, F
    Foster, I
    Bresnahan, J
    Czajkowski, K
    Gawor, J
    Kesselman, C
    Meder, S
    Pearlman, L
    Tuecke, S
    12TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2003, : 48 - 57
  • [23] Multimedia services & security
    Delgado, J
    INTELLIGENCE IN SERVICES AND NETWORKS: PAVING THE WAY FOR AN OPEN SERVICE MARKET, 1999, 1597 : 355 - 356
  • [24] Security by Insurance for Services
    Martinelli, Fabio
    Yautsiukhin, Artsiom
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2016), 2016, : 344 - 351
  • [25] Security services agreement
    不详
    NUCLEAR PLANT JOURNAL, 1997, 15 (01) : 12 - 13
  • [26] Rising security services
    不详
    R&D MAGAZINE, 2003, 45 (12): : 17 - 17
  • [27] Security in telecommunication services
    Degiovanni, B
    Montechiarini, C
    Riciniello, F
    Volpe, M
    AEI AUTOMAZIONE ENERGIA INFORMAZIONE, 1996, 83 (02): : 149 - 155
  • [28] Security LCM Services
    Yamaki, Tsuyoshi
    Shibata, Akira
    Ohkoshi, Yoshihiko
    Kodama, Jun
    NEC Technical Journal, 2018, 12 (02): : 55 - 58
  • [29] Wearable security services
    Al-Muhtadi, J
    Mickunas, D
    Campbell, R
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2001, : 266 - 271
  • [30] Security of Web services
    Krawczyk, H.
    Wielgus, M.
    DEPCOS-RELCOMEX 2006, 2006, : 183 - +