A Defense Mechanism against Location Cheating Attack in Social Network

被引:0
作者
Li, Qing [1 ]
Ye, Ayong [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
来源
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) | 2017年
基金
中国国家自然科学基金;
关键词
social network; WLAN-based localization; location cheating attack; AP tag; fuzzy extractors;
D O I
10.1109/DSC.2017.76
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the gradual popularity of location-based social network service, the localization technologies, for example the WLAN-based positioning technique, have become the premise of the service. Nevertheless, the positioning system is vulnerable to spoofing attack resulting in the user's identity divulged, due to the openness of the wireless network. The paper firstly implements a location cheating attack by means of fake base stations to make the device locate to the specific position, which illustrates the potential risk of leakage of the user's private information. And then a mechanism is proposed to resist the attack by extracting the Access Point (AP) frames to construct corresponding AP tag and verifying the AP tag's consistency with its unpredictability, which can improve the robustness of terminal positioning. Finally, the security of the defense method is analyzed from the theoretical aspects.
引用
收藏
页码:549 / 553
页数:5
相关论文
共 10 条
  • [1] [Anonymous], 2006, SIAM J COMPUTING
  • [2] I know your MAC address: targeted tracking of individual using Wi-Fi
    Cunche, Mathieu
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (04): : 219 - 227
  • [3] Henne Benjamin, 2013, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks,WiSec '13, P95, DOI 10.1145/2462096.2462113
  • [4] Analyzing Spoofing Attacks in Wireless Networks
    Jindal, Keshav
    Dalal, Surjeet
    Sharma, Kamal Kumar
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 398 - +
  • [5] Lin Zi., 2012, Financial Cryptography, P73, DOI [10.1007/978-3-642-32946-3_7, DOI 10.1007/978-3-642-32946-3_7]
  • [6] Qiu Q, 2009, P INT TECH M I NAVIG, P586
  • [7] Saputro W U., 2012, JURNAL KEDOKTERAN KO
  • [8] Tippenhauer NO, 2009, MOBISYS'09: PROCEEDINGS OF THE 7TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P29
  • [9] Yanxu Zheng, 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), P1, DOI 10.1109/ISSNIP.2015.7106902
  • [10] Zhou Ao-Ying, 2011, Chinese Journal of Computers, V34, P1155, DOI 10.3724/SP.J.1016.2011.01155