Skip to main content

Geofencing in a Security Strategy Model

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 45))

Abstract

The aim of this research paper is to investigate and create a security strategy model using geofencing; which can then be used to secure wireless local area networks (WLANs). In order to do so, the investigation will use the systematic arrangement and design used by geofencing technology for locating pre-configured wireless laptop. The objective is for the wireless laptop to function within a defined geographical area and be served by a specified wireless intercommunication unit. This is so that the defined geographical area can be used as a geo-fenced test bed to monitor the acts of the wireless laptop when communicating with the electromagnetic waves which is the medium through which it transmits data and communicates with the wireless intercommunication unit. By performing this experiment the security strategy model will be used to observe, detect and record the operations of the electromagnetic waves as they convey information within the geo-fenced test bed to the wireless laptop. Finally, by recording the operations the investigation will look to identify if predetermined acts took place within the geo-fenced test bed and in so doing develop a trusted security strategy model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, G., He, T., Krishnamaturithy, S., Stankovic, J.: Models and solutions for radio irregularity in wireless sensor networks. ACM Transactions on Sensor Networks 2(2), 221–262 (2006)

    Article  Google Scholar 

  2. Chan, H., Dash, D., Perrig, A., Zhang, H.: Modeling adoptability of secure BGP protocols. In: Proceedings of the Joint international Conference on Measurement and Modeling of Computer Systems. SIGMETRICS 2006/Performance 2006, Saint Malo, France, June 26 - 30, 2006, pp. 389–390. ACM, New York (2006)

    Google Scholar 

  3. Landwehr, C.: Formal Models for Computer Security. Computing surveys 13(3), 247–278 (1981)

    Article  Google Scholar 

  4. Microsoft; Microsoft Corporation, p. 17 (2006)

    Google Scholar 

  5. Khosravi, K., Gueheneuc, Y.: On Issues with Software Quality Models. In: The Proceedings of the 11th Working Conference on Reverse Engineering. GEODES 2004, pp. 172–181. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  6. Squair, M.: The Australian Computer Society (2005)

    Google Scholar 

  7. Chen, Y., Chan, Y., She, C.: Enabling location-based services in wireless LAN hotspots. International Journal of Network Management 2005 15(3), 163–175 (2005)

    Article  Google Scholar 

  8. Jensen, S.C., et al.: Multidimensional Data Modelling for Location-Based Services. The International Journal on Very Large Data Bases Journal 13(1), 1–21 (2002)

    Article  Google Scholar 

  9. Wong, S.: The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards SANS Institute 2003 (2003), http://www.sans.org/reading_room/whitepapers/wireless/ (accessed, August 2008)

  10. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international Symposium on Mobile Ad Hoc Networking and Computing. MobiHoc 2005, Urbana-Champaign, IL, USA, May 25 - 27, 2005, pp. 46–57. ACM, New York (2005)

    Google Scholar 

  11. Pietro, R., Mancini, L., Mei, A.: Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks. Wireless Networks 12(6), 709–721 (2006)

    Article  Google Scholar 

  12. Brimicombe, A.J., Li, C.: Location-Based Services and Geo-Information Engineering, pp. 9–57. Wiley, Chichester (2009)

    Google Scholar 

  13. Friday, A., Wu, M., et al.: Network Layer Access Control for context Aware IPv6 Applications. Wireless Networks 9(4), 299–309 (2003)

    Article  Google Scholar 

  14. Almers, P.: Survey of Channel and Radio Propagation Models for Wireless MIMO Systems. EURASIP Journal on Wireless Communications and Networking 2007, 19 pages (2007)

    Article  Google Scholar 

  15. Travostino, F.: Towards an active IP accounting infrastructure. In: Proceeding of 2000 IEEE Third Conference on Open Architectures and Network Programming. OPENARCH 2000, March 2000, pp. 45–54 (2000), doi:10.1109/OPNARC.2000.828132

    Google Scholar 

  16. Carzaniga, A., et al.: A Characterization Framework for Software Deployment Technologies, Air Force Material Command, Rome Laboratory, and the Defence Advanced Research Projects Agency under Contract Number F30602-94-C-0253 (1998)

    Google Scholar 

  17. Haley, C., Moffett, J., et al.: A framework for security requirements engineering. ACM, 35–41 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ijeh, A.C., Brimicombe, A.J., Preston, D.S., Imafidon, C.O. (2009). Geofencing in a Security Strategy Model. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04062-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04061-0

  • Online ISBN: 978-3-642-04062-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics