Abstract
The aim of this research paper is to investigate and create a security strategy model using geofencing; which can then be used to secure wireless local area networks (WLANs). In order to do so, the investigation will use the systematic arrangement and design used by geofencing technology for locating pre-configured wireless laptop. The objective is for the wireless laptop to function within a defined geographical area and be served by a specified wireless intercommunication unit. This is so that the defined geographical area can be used as a geo-fenced test bed to monitor the acts of the wireless laptop when communicating with the electromagnetic waves which is the medium through which it transmits data and communicates with the wireless intercommunication unit. By performing this experiment the security strategy model will be used to observe, detect and record the operations of the electromagnetic waves as they convey information within the geo-fenced test bed to the wireless laptop. Finally, by recording the operations the investigation will look to identify if predetermined acts took place within the geo-fenced test bed and in so doing develop a trusted security strategy model.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Zhou, G., He, T., Krishnamaturithy, S., Stankovic, J.: Models and solutions for radio irregularity in wireless sensor networks. ACM Transactions on Sensor Networks 2(2), 221–262 (2006)
Chan, H., Dash, D., Perrig, A., Zhang, H.: Modeling adoptability of secure BGP protocols. In: Proceedings of the Joint international Conference on Measurement and Modeling of Computer Systems. SIGMETRICS 2006/Performance 2006, Saint Malo, France, June 26 - 30, 2006, pp. 389–390. ACM, New York (2006)
Landwehr, C.: Formal Models for Computer Security. Computing surveys 13(3), 247–278 (1981)
Microsoft; Microsoft Corporation, p. 17 (2006)
Khosravi, K., Gueheneuc, Y.: On Issues with Software Quality Models. In: The Proceedings of the 11th Working Conference on Reverse Engineering. GEODES 2004, pp. 172–181. IEEE Computer Society Press, Los Alamitos (2004)
Squair, M.: The Australian Computer Society (2005)
Chen, Y., Chan, Y., She, C.: Enabling location-based services in wireless LAN hotspots. International Journal of Network Management 2005 15(3), 163–175 (2005)
Jensen, S.C., et al.: Multidimensional Data Modelling for Location-Based Services. The International Journal on Very Large Data Bases Journal 13(1), 1–21 (2002)
Wong, S.: The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards SANS Institute 2003 (2003), http://www.sans.org/reading_room/whitepapers/wireless/ (accessed, August 2008)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international Symposium on Mobile Ad Hoc Networking and Computing. MobiHoc 2005, Urbana-Champaign, IL, USA, May 25 - 27, 2005, pp. 46–57. ACM, New York (2005)
Pietro, R., Mancini, L., Mei, A.: Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks. Wireless Networks 12(6), 709–721 (2006)
Brimicombe, A.J., Li, C.: Location-Based Services and Geo-Information Engineering, pp. 9–57. Wiley, Chichester (2009)
Friday, A., Wu, M., et al.: Network Layer Access Control for context Aware IPv6 Applications. Wireless Networks 9(4), 299–309 (2003)
Almers, P.: Survey of Channel and Radio Propagation Models for Wireless MIMO Systems. EURASIP Journal on Wireless Communications and Networking 2007, 19 pages (2007)
Travostino, F.: Towards an active IP accounting infrastructure. In: Proceeding of 2000 IEEE Third Conference on Open Architectures and Network Programming. OPENARCH 2000, March 2000, pp. 45–54 (2000), doi:10.1109/OPNARC.2000.828132
Carzaniga, A., et al.: A Characterization Framework for Software Deployment Technologies, Air Force Material Command, Rome Laboratory, and the Defence Advanced Research Projects Agency under Contract Number F30602-94-C-0253 (1998)
Haley, C., Moffett, J., et al.: A framework for security requirements engineering. ACM, 35–41 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ijeh, A.C., Brimicombe, A.J., Preston, D.S., Imafidon, C.O. (2009). Geofencing in a Security Strategy Model. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-04062-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04061-0
Online ISBN: 978-3-642-04062-7
eBook Packages: Computer ScienceComputer Science (R0)