TY - GEN
T1 - LINK
T2 - 7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010
AU - Talasila, Manoop
AU - Curtmola, Reza
AU - Borcea, Cristian
PY - 2012/12/1
Y1 - 2012/12/1
N2 - In many location-based services, the user location is determined on the mobile device and then shared with the service. For this type of interaction, a major problem is how to prevent service abuse by malicious users who lie about their location. This paper proposes LINK (Location verification through Immediate Neighbors Knowledge), a location authentication protocol in which users help verify each other's location claims. This protocol is independent of the wireless network carrier, and thus works for any third-party service. For each user's location claim, a centralized Location Certification Authority (LCA) receives a number of verification messages from neighbors contacted by the claimer using short-range wireless networking such as Bluetooth. The LCA decides whether the claim is authentic or not based on spatio-temporal correlation between the users, trust scores associated with each user, and historical trends of the trust scores. LINK thwarts attacks from individual malicious claimers or malicious verifiers. Over time, it also detects attacks involving groups of colluding users.
AB - In many location-based services, the user location is determined on the mobile device and then shared with the service. For this type of interaction, a major problem is how to prevent service abuse by malicious users who lie about their location. This paper proposes LINK (Location verification through Immediate Neighbors Knowledge), a location authentication protocol in which users help verify each other's location claims. This protocol is independent of the wireless network carrier, and thus works for any third-party service. For each user's location claim, a centralized Location Certification Authority (LCA) receives a number of verification messages from neighbors contacted by the claimer using short-range wireless networking such as Bluetooth. The LCA decides whether the claim is authentic or not based on spatio-temporal correlation between the users, trust scores associated with each user, and historical trends of the trust scores. LINK thwarts attacks from individual malicious claimers or malicious verifiers. Over time, it also detects attacks involving groups of colluding users.
KW - Secure location authentication
KW - smart phones
KW - trust
UR - http://www.scopus.com/inward/record.url?scp=84890038677&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84890038677&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-29154-8-18
DO - 10.1007/978-3-642-29154-8-18
M3 - Conference contribution
AN - SCOPUS:84890038677
SN - 9783642291531
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 210
EP - 223
BT - Mobile and Ubiquitous Systems
Y2 - 6 December 2010 through 9 December 2010
ER -