Back to Search Start Over

Constrained Proximity Attacks on Mobile Targets.

Authors :
XUEOU WANG
XIAOLU HOU
RIOS, RUBEN
TIPPENHAUER, NILS OLE
OCHOA, MARTÍN
Source :
ACM Transactions on Privacy & Security; Mar2022, Vol. 25 Issue 2, p1-29, 29p
Publication Year :
2022

Abstract

Proximity attacks allow an adversary to uncover the location of a victim by repeatedly issuing queries with fake location data. These attacks have been mostly studied in scenarios where victims remain static and there are no constraints that limit the actions of the attacker. In such a setting, it is not difficult for the attacker to locate a particular victim and quantifying the effort for doing so is straightforward. However, it is far more realistic to consider scenarios where potential victims present a particular mobility pattern. In this article, we consider abstract (constrained and unconstrained) attacks on services that provide location information on other users in the proximity. We derive strategies for constrained and unconstrained attackers, and show that when unconstrained they can practically achieve success with theoretically optimal effort. We then propose a simple yet effective constraint that may be employed by a proximity service (for example, running in the cloud or using a suitable two-party protocol) as a countermeasure to increase the effort for the attacker several orders of magnitude both in simulated and real-world cases. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
24712566
Volume :
25
Issue :
2
Database :
Complementary Index
Journal :
ACM Transactions on Privacy & Security
Publication Type :
Academic Journal
Accession number :
157783293
Full Text :
https://doi.org/10.1145/3498543