Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

被引:12
|
作者
Ulltveit-Moe, Nils [1 ]
Oleshchuk, Vladimir A. [1 ]
Koien, Geir M. [1 ]
机构
[1] Univ Agder, N-4898 Grimstad, Norway
关键词
5G; Mobility; Security; Personal privacy; Location profile; Intrusion detection and prevention; SECURITY;
D O I
10.1007/s11277-010-0069-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mobile devices will be attractive targets for malicious software, and this threat will in some cases change with location. Mobile devices will store more sensitive information and will also be used to a larger extent for sensitive transactions than they typically do today. In addition, a distributed execution environment in itself gives raise to some new security challenges. In order to handle these security challenges, we have proposed the location-aware mIPS architecture, which benefits from a distributed execution environment where processor intensive services can be outsourced to Cloud hosting providers. The mIPS supports querying location threat profiles in a privacy-preserving way, and ensures that mIPS alerts sent to the the first-line MSS are anonymised. We finally perform an analysis of potential strengths and weaknesses of the proposed approach.
引用
收藏
页码:317 / 338
页数:22
相关论文
共 50 条
  • [1] Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
    Nils Ulltveit-Moe
    Vladimir A. Oleshchuk
    Geir M. Køien
    [J]. Wireless Personal Communications, 2011, 57 : 317 - 338
  • [2] Privacy-preserving Location-aware Mobile Advertisement
    Troja, Erald
    Bakiras, Spiridon
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 783 - 790
  • [3] Location-Aware Communications for 5G Networks [How location information can improve latency, and robustness of 5G]
    Di Taranto, Rocco
    Muppirisetty, Srikar
    Raulefs, Ronald
    Slock, Dirk T. M.
    Svensson, Tommy
    Wynneersch, Henk
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2014, 31 (06) : 102 - 112
  • [4] Privacy and location-aware service discovery for mobile and ubiquitous systems
    Jimenez, Leonardo Galicia
    Garcia-Macias, J. Antonio
    [J]. MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2006, 211 : 47 - +
  • [5] Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
    Yu Wang
    Dingbang Xu
    Fan Li
    [J]. Tsinghua Science and Technology, 2016, 21 (03) : 243 - 259
  • [6] Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
    Wang, Yu
    Xu, Dingbang
    Li, Fan
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 243 - 259
  • [7] Positioning and Location-Aware Communications for Modern Railways with 5G New Radio
    Talvitie, Jukka
    Levanen, Toni
    Koivisto, Mike
    Ihalainen, Tero
    Pajukoski, Karl
    Valkama, Mikko
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (09) : 24 - 30
  • [8] Architecture, Protocols, and Algorithms for Location-Aware Services in beyond 5G Networks
    Hammarberg, Peter
    Vinogradova, Julia
    Fodor, Gabor
    Shreevastav, Ritesh
    Dwivedi, Satyam
    Gunnarsson, Fredrik
    [J]. IEEE Communications Standards Magazine, 2022, 6 (04): : 88 - 95
  • [9] Designs of privacy protection in location-aware mobile social networking applications
    Tan, Rong
    Gu, Jun-Zhong
    Yang, Jing
    Lin, Xin
    Chen, Peng
    Qiao, Zhe-Feng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2010, 21 (SUPPL. 1): : 298 - 309
  • [10] Privacy in location-aware computing environments
    Anthony, Denise
    Kotz, David
    Henderson, Tristan
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 64 - 72