Ítem
Solo Metadatos
Location proximity attacks against mobile targets: Analytical bounds and attacker strategies
dc.creator | Wang X. | spa |
dc.creator | Hou X. | spa |
dc.creator | Rios R. | spa |
dc.creator | Hallgren P. | spa |
dc.creator | Tippenhauer N.O. | spa |
dc.creator | Ochoa M. | spa |
dc.date.accessioned | 2020-05-25T23:56:48Z | |
dc.date.available | 2020-05-25T23:56:48Z | |
dc.date.created | 2018 | spa |
dc.description.abstract | Location privacy has mostly focused on scenarios where users remain static. However, investigating scenarios where the victims present a particular mobility pattern is more realistic. In this paper, we consider abstract attacks on services that provide location information on other users in the proximity. In that setting, we quantify the required effort of the attacker to localize a particular mobile victim. We prove upper and lower bounds for the effort of an optimal attacker. We experimentally show that a Linear Jump Strategy (LJS) practically achieves the upper bounds for almost uniform initial distributions of victims. To improve performance for less uniform distributions known to the attacker, we propose a Greedy Updating Attack Strategy (GUAS). Finally, we derive a realistic mobility model from a real-world dataset and discuss the performance of our strategies in that setting. © 2018, Springer Nature Switzerland AG. | eng |
dc.format.mimetype | application/pdf | |
dc.identifier.doi | https://doi.org/10.1007/978-3-319-98989-1_19 | |
dc.identifier.uri | https://repository.urosario.edu.co/handle/10336/22527 | |
dc.language.iso | eng | spa |
dc.publisher | Springer Verlag | spa |
dc.relation.citationEndPage | 392 | |
dc.relation.citationStartPage | 373 | |
dc.relation.citationTitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.relation.citationVolume | Vol. 11099 LNCS | |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol.11099 LNCS,(2018); pp. 373-392 | spa |
dc.relation.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051865842&doi=10.1007%2f978-3-319-98989-1_19&partnerID=40&md5=cc65c09ad6b87f30ab1d65089ff24fcd | spa |
dc.rights.accesRights | info:eu-repo/semantics/openAccess | |
dc.rights.acceso | Abierto (Texto Completo) | spa |
dc.source.instname | instname:Universidad del Rosario | spa |
dc.source.reponame | reponame:Repositorio Institucional EdocUR | spa |
dc.subject.keyword | Security of data | spa |
dc.subject.keyword | Security systems | spa |
dc.subject.keyword | Analytical bounds | spa |
dc.subject.keyword | Attack strategies | spa |
dc.subject.keyword | Improve performance | spa |
dc.subject.keyword | Location information | spa |
dc.subject.keyword | Mobility pattern | spa |
dc.subject.keyword | Realistic mobility models | spa |
dc.subject.keyword | Uniform distribution | spa |
dc.subject.keyword | Upper and lower bounds | spa |
dc.subject.keyword | Location | spa |
dc.title | Location proximity attacks against mobile targets: Analytical bounds and attacker strategies | spa |
dc.type | conferenceObject | eng |
dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | |
dc.type.spa | Documento de conferencia | spa |