DOI QR코드

DOI QR Code

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso (Faculty at School of CET, Dr. Vishwanath Karad MIT World Peace University) ;
  • Sugave, Shounak (Faculty at School of CET, Dr. Vishwanath Karad MIT World Peace University) ;
  • Kolhe, Kishor (Faculty at School of CET, Dr. Vishwanath Karad MIT World Peace University)
  • Published : 2021.12.30

Abstract

Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Keywords

References

  1. S. Shafiee, H. Shafiee and F. Mortazavi, "Security of crowd sourcing," 2016 10th International Conference on e-Commerce in Developing Countries: with focus on e-Tourism (ECDC), Isfahan, 2016, pp. 1-6.doi: 10.1109/ECDC.2016.7492978
  2. X. Zheng, P. Maille, C. T. P. Le and S. M. Swid, "Trust Mechanisms for Efficiency Improvement in Collaborative Working Environments," 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Miami Beach, FL, 2010, pp. 465-467.
  3. Nidhi Singhal and JPS Raina, "Comparative analysis of AES and RC4 for better utilization, International journal on computer trends and technology, ISSN 2231, 2011
  4. Simar Preet Singh, and Raman Maini, "COMPARISON OF DATA ENCRYPTION ALGORITHMS", International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125-127
  5. Guillermo A. Francia III MCIS & Rahjima R. Francia "An Empirical Study on the Performance of Java/.Net Cryptographic APIs", Information Systems Security, 16:6, 344-354, DOI: 10.1080/10658980701784602
  6. B. N. Jagdale, J. W. Bakal, "Issues of Cryptographic Performance in Resource Constrained Devices Experimental Study", International Conference on Intelligent Computing & Communication -2017, ISBN 978-981-10-7245-1, publication by Advances in Intelligent Systems & Computing (AISC), Springer, August 2017. https://doi.org/10.1007/978-981-10-7245-1_44
  7. Y. Pu, J. Luo, Y. Wang, C. Hu, Y. Huo and J. Zhang, "Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach," 2018 IEEE Symposium on Privacy-Aware Computing (PAC), 2018, pp. 125-126, doi: 10.1109/PAC.2018.00022.
  8. J. Zhou, Z. Cao, Z. Qin, X. Dong and K. Ren, "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 420-434, 2020, doi: 10.1109/TIFS.2019.2923156.
  9. Levent Ertaul, Nitu J. Chavan, "Privacy in Location Based Services (LBS) via Composite Functions: The L4NE Protocol", IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
  10. G. Chen et al., "Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection," in IEEE Access, vol. 7, pp. 101704-101717, 2019, doi: 10.1109/ACCESS.2019.2931056.
  11. C. Shouqi, L. Wanrong, C. Liling, S. Qing and H. Xin, "An Improved Anonymous Authentication Protocol for Location-Based Service," in IEEE Access, vol. 7, pp. 114203-114212, 2019, doi: 10.1109/ACCESS.2019.2930740.
  12. P. Asuquo et al., "Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges, and Countermeasures," in IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4778-4802, Dec. 2018, doi: 10.1109/JIOT.2018.2820039.
  13. X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar and N. Kumar, "A Lightweight Privacy-Preserving Authentication Protocol for VANETs," in IEEE Systems Journal, vol. 14, no. 3, pp. 3547-3557, Sept. 2020, doi: 10.1109/JSYST.2020.2991168.
  14. L. Yu, X. Su and L. Zhang, "Collaboration-Based Location Privacy Protection Method," 2019 IEEE 2nd International Conference on Electronics Technology (ICET), 2019, pp. 639-643, doi: 10.1109/ELTECH.2019.8839605.
  15. L. Zheng, H. Yue, L. Zhang and X. Pan, "A New Location Privacy Protection Algorithm," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017, pp. 364-367, doi: 10.1109/CSE-EUC.2017.253.
  16. K. M. Mahesh Kumar and N. R. Sunitha, "Preserving Location Data Integrity in Location Based Servers using Blockchain Technology," 2017 2nd International Conference On Emerging Computation and Information Technologies (ICECIT), 2017, pp. 1-6, doi: 10.1109/ICECIT.2017.8453286.
  17. E. Elmahdi and S. -M. Yoo, "Secure Data Integrity in VANETs based on CS-DC Scheme," 2020 IEEE Latin-American Conference on Communications (LATINCOM), 2020, pp. 1-5, doi: 10.1109/LATINCOM50620.2020.9282267.
  18. B. N. Jagdale, J. W. Bakal, "Privacy Aware Monitoring of Mobile Users in Sensor Networks Environment", iJIM International Journal: Interactive Mobile Technologies DOI:10.3991/ijim.v13i02.10023, eISSN: 1865-7923, iJIM Vol. 13, No. 2, Pages 127-140, 2019
  19. Turki Kordy, Fazal Noor and Oussama Benrhouma, "Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography", IJCSNS International Journal of Computer Science and Network Security, VOL.21 No.10, October 2021