Abstract
Currently in mobile location-based services the application relies solely on the coordinates provided by the phone’s operating system to determine its location. The application residing on the phone then submits the resulting location data to the application server, leaving the protocol insecure as a dishonest user can inject fake data at the last step. In this paper we propose a new method that allows an application to independently verify the integrity of submitted data by checking its plausibility given surrounding Wifi access points. Instead of the traditional single channel of information, namely the submitted coordinates, the application can supplement a second channel to potentially filter out fraudulent location data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994), http://dx.doi.org/10.1007/3-540-48285-7_30
González-Tablas, A.I., Kursawe, K., Ramos, B., Ribagorda, A.: Survey on location authentication protocols and spatial-temporal attestation services. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 797–806. Springer, Heidelberg (2005)
Han, K., Kim, K.: Enhancing privacy and authentication for location based service using trusted authority. In: 2nd Joint Workshop on Information Security (2007)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 1–10. ACM (2003)
Zandbergen, P.A.: Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS 13, 5–25 (2009), http://dx.doi.org/10.1111/j.1467-9671.2009.01152.x
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, R., Yu, D. (2013). Towards a Stronger Location Integrity. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds) Security Protocols XXI. Security Protocols 2013. Lecture Notes in Computer Science, vol 8263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41717-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-41717-7_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41716-0
Online ISBN: 978-3-642-41717-7
eBook Packages: Computer ScienceComputer Science (R0)