On the security of distributed position services

被引:2
|
作者
Wu, XX [1 ]
Nita-Rotaru, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/SECURECOMM.2005.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Position-based routing protocols make routing decisions based on the geographical position of the destination of a packet. Such protocols scale well since they do not require nodes to maintain explicit routes. Instead each node must know only its own position, the position of its neighbors, and the position of the destination. Thus, a critical component of position-based routing protocols is the position service that allows nodes to obtain the position of a destination node. In this paper we analyze the security vulnerabilities of position-based routing protocols and virtual home region (VHR)-based distributed position service systems. We propose methods to protect the position information from both external and internal attackers. We then discuss and propose several mitigation mechanisms against position abuse by internal attackers that exploit the position service to trace their targets. Finally, we propose a position verification mechanism that allows the position service to verify that the positions reported by nodes are correct.
引用
收藏
页码:35 / 44
页数:10
相关论文
共 50 条
  • [41] Position, Navigation, and Time Services
    Narins, Mitch
    PROCEEDINGS OF THE 2009 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION - ITM 2009, 2009, : 531 - 576
  • [42] Security issues in distributed software
    Kemmerer, RA
    SOFTWARE ENGINEERING - ESEC/FSE '97, 1997, 1301 : 52 - 59
  • [43] Distributed security policy conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    COMPUTERS & SECURITY, 2013, 33 : 28 - 40
  • [44] SECURITY PROBLEMS IN DISTRIBUTED SYSTEMS
    Hasanova, N. A.
    Alizade, U. M.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2018, : 144 - 146
  • [45] Distributed security schemes for networks
    Wunnava, SV
    Lule, E
    IEEE SOUTHEASTCON 2001: ENGINEERING THE FUTURE, PROCEEDINGS, 2001, : 114 - 117
  • [46] A distributed approach to security in sensornets
    Bhuse, V
    Gupta, A
    Pidva, R
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 3010 - 3014
  • [47] DISTRIBUTED DATABASE-SECURITY
    HARRIS, D
    SIDWELL, D
    COMPUTERS & SECURITY, 1994, 13 (07) : 547 - 557
  • [48] Cooperative security in distributed networks
    Garcia-Morchon, Oscar
    Kuptsov, Dmitriy
    Gurtov, Andrei
    Wehrle, Klaus
    COMPUTER COMMUNICATIONS, 2013, 36 (12) : 1284 - 1297
  • [49] On Distributed Database Security Aspects
    Zubi, Zakaria Suliman
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 231 - 235
  • [50] Multimedia security in the distributed environment
    Liu, YL
    Gao, W
    Liu, SH
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 639 - 642