Authentication in GPS-directed mobile clouds

Jonathan A. Larcom, Hong Liu
{"title":"Authentication in GPS-directed mobile clouds","authors":"Jonathan A. Larcom, Hong Liu","doi":"10.1109/GLOCOMW.2013.6825032","DOIUrl":null,"url":null,"abstract":"Mobile clouds fuse cloud computing and mobile computing with wireless networking in everyday life. Many applications of mobile clouds deploy GPS (Global Positioning System) to find locations and to synchronize clocks. Though security starts to draw scrutiny from academy, industry, and government, authentication in GPS-directed mobile clouds has not been brought to the table. Authentication of GPS acts as the first responder against security breaches. This paper, among the first, examines the vulnerabilities in GPS-directed mobile clouds. By systematic analysis, an attack model is devised to demonstrate the existing threats and to predict futuristic attack tactics. The paper proposes a novel defense approach, namely vertical-horizontal design of authentication. Vertical-horizontal design extends cross-layer design of cloud and device stacks (vertical) with interface design between sections of the system (horizontal). The solutions will be validated with event-driven simulation that complements incidental dangers and legal/regulation restrictions associated in experimenting with GPS-dependent systems.","PeriodicalId":174992,"journal":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2013.6825032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Mobile clouds fuse cloud computing and mobile computing with wireless networking in everyday life. Many applications of mobile clouds deploy GPS (Global Positioning System) to find locations and to synchronize clocks. Though security starts to draw scrutiny from academy, industry, and government, authentication in GPS-directed mobile clouds has not been brought to the table. Authentication of GPS acts as the first responder against security breaches. This paper, among the first, examines the vulnerabilities in GPS-directed mobile clouds. By systematic analysis, an attack model is devised to demonstrate the existing threats and to predict futuristic attack tactics. The paper proposes a novel defense approach, namely vertical-horizontal design of authentication. Vertical-horizontal design extends cross-layer design of cloud and device stacks (vertical) with interface design between sections of the system (horizontal). The solutions will be validated with event-driven simulation that complements incidental dangers and legal/regulation restrictions associated in experimenting with GPS-dependent systems.
gps定向移动云中的身份验证
移动云融合了云计算和移动计算与无线网络在日常生活中的应用。许多移动云应用部署GPS(全球定位系统)来查找位置和同步时钟。虽然安全性开始受到学术界、工业界和政府的密切关注,但gps导向的移动云中的身份验证还没有被提上日程。GPS身份验证作为安全漏洞的第一响应者。本文首先研究了gps定向移动云中的漏洞。通过系统的分析,设计了一个攻击模型来展示现有的威胁,并预测未来的攻击战术。本文提出了一种新的防御方法,即纵向横向认证设计。垂直水平设计通过系统各部分之间的接口设计(水平)扩展了云和设备堆栈的跨层设计(垂直)。这些解决方案将通过事件驱动的模拟进行验证,以补充与gps相关系统试验相关的附带危险和法律/法规限制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信