Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

LINK: Location Verification through Immediate Neighbors Knowledge

Download88 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_18,
        author={Manoop Talasila and Reza Curtmola and Cristian Borcea},
        title={LINK: Location Verification through Immediate Neighbors Knowledge},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={Secure location authentication trust smart phones},
        doi={10.1007/978-3-642-29154-8_18}
    }
    
  • Manoop Talasila
    Reza Curtmola
    Cristian Borcea
    Year: 2012
    LINK: Location Verification through Immediate Neighbors Knowledge
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_18
Manoop Talasila1,*, Reza Curtmola1,*, Cristian Borcea1,*
  • 1: New Jersey Institute of Technology
*Contact email: mt57@njit.edu, crix@njit.edu, borcea@cs.njit.edu

Abstract

In many location-based services, the user location is determined on the mobile device and then shared with the service. For this type of interaction, a major problem is how to prevent service abuse by malicious users who lie about their location. This paper proposes LINK (Location verification through Immediate Neighbors Knowledge), a location authentication protocol in which users help verify each other’s location claims. This protocol is independent of the wireless network carrier, and thus works for any third-party service. For each user’s location claim, a centralized Location Certification Authority (LCA) receives a number of verification messages from neighbors contacted by the claimer using short-range wireless networking such as Bluetooth. The LCA decides whether the claim is authentic or not based on spatio-temporal correlation between the users, trust scores associated with each user, and historical trends of the trust scores. LINK thwarts attacks from individual malicious claimers or malicious verifiers. Over time, it also detects attacks involving groups of colluding users.