Jin, L and Palanisamy, B and Joshi, J
(2014)
Compromising cloaking-based location privacy preserving mechanisms with location injection attacks.
In: UNSPECIFIED.
![[img]](http://d-scholarship.pitt.edu/style/images/fileicons/text_plain.png) |
Plain Text (licence)
Available under License : See the attached license file.
Download (1kB)
|
Abstract
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks. However, a fundamental limitation of such mechanisms is that users in the system are inherently trusted and assumed to always report their true locations. Such vulnerability can lead to a new class of attacks called location injection attacks which can successfully break users' anonymity among a set of users through the injection of fake user accounts and incorrect location updates. In this paper, we characterize location injection attacks, demonstrate their effectiveness through experiments on real-world geographic maps and discuss possible defense mechanisms to protect against location injection attacks. Copyright is held by the author/owner(s).
Share
Citation/Export: |
|
Social Networking: |
|
Details
Item Type: |
Conference or Workshop Item
(UNSPECIFIED)
|
Status: |
Published |
Creators/Authors: |
|
Date: |
3 November 2014 |
Date Type: |
Publication |
Access Restriction: |
No restriction; Release the ETD for access worldwide immediately. |
Journal or Publication Title: |
Proceedings of the ACM Conference on Computer and Communications Security |
Page Range: |
1439 - 1441 |
Event Type: |
Conference |
DOI or Unique Handle: |
10.1145/2660267.2662386 |
Institution: |
University of Pittsburgh |
Schools and Programs: |
School of Information Sciences > Information Science |
Refereed: |
Yes |
ISBN: |
9781450329576 |
ISSN: |
1543-7221 |
Date Deposited: |
09 Jul 2015 13:41 |
Last Modified: |
22 Jun 2021 13:55 |
URI: |
http://d-scholarship.pitt.edu/id/eprint/25585 |
Metrics
Monthly Views for the past 3 years
Plum Analytics
Altmetric.com
Actions (login required)
 |
View Item |