Securing the Rover System
dc.contributor.author | Agarwal, Sulabh | en_US |
dc.contributor.author | Kamel, Kevin | en_US |
dc.date.accessioned | 2004-05-31T23:19:36Z | |
dc.date.available | 2004-05-31T23:19:36Z | |
dc.date.created | 2002-06 | en_US |
dc.date.issued | 2002-08-01 | en_US |
dc.description.abstract | Rover is a system designed to provide location-based services to users in a wireless environment. Rover has the potential to be deployed in a variety of commercial scenarios as well as for emergency relief, disaster management, etc. Given that Rover may be used in mission critical situations it's integrity is imperative. In this paper the Rover architecture is studied to identify its security vulnerabilities. A design is proposed to secure Rover and details of its implementation are also presented. Also UMIACS-TR-2002-58 | en_US |
dc.format.extent | 2731463 bytes | |
dc.format.mimetype | application/postscript | |
dc.identifier.uri | http://hdl.handle.net/1903/1210 | |
dc.language.iso | en_US | |
dc.relation.isAvailableAt | Digital Repository at the University of Maryland | en_US |
dc.relation.isAvailableAt | University of Maryland (College Park, Md.) | en_US |
dc.relation.isAvailableAt | Tech Reports in Computer Science and Engineering | en_US |
dc.relation.isAvailableAt | UMIACS Technical Reports | en_US |
dc.relation.ispartofseries | UM Computer Science Department; CS-TR-4378 | en_US |
dc.relation.ispartofseries | UMIACS; UMIACS-TR-2002-58 | en_US |
dc.title | Securing the Rover System | en_US |
dc.type | Technical Report | en_US |