Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services 2016
DOI: 10.1145/2906388.2906420
|View full text |Cite
|
Sign up to set email alerts
|

Defending against Sybil Devices in Crowdsourced Mapping Services

Abstract: Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based Sybil devices that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(30 citation statements)
references
References 42 publications
0
30
0
Order By: Relevance
“…It is not efficient [24][25][26]. For example, at to the NS app, one may randomize some items of his/her profiles (e.g., nickname, user ID) to disconnect the linkage between user IDs and locations each time when he/she looks for nearby strangers [27], hence preventing an attacker from inferring the privacy even if the location is leaked.…”
Section: Recommendations On Countermeasuresmentioning
confidence: 99%
“…It is not efficient [24][25][26]. For example, at to the NS app, one may randomize some items of his/her profiles (e.g., nickname, user ID) to disconnect the linkage between user IDs and locations each time when he/she looks for nearby strangers [27], hence preventing an attacker from inferring the privacy even if the location is leaked.…”
Section: Recommendations On Countermeasuresmentioning
confidence: 99%
“…AnonySense was one of the earliest solutions that utilize group signatures for crowdsensing. As pointed in [59], the way AnonySense [28] employs group signatures renders it vulnerable to Sybil attacks [60]. Because in AnonySense, it is impossible to identify signatures from the same participant, without opening the signatures of all data reports.…”
Section: Privacy In Crowdsensingmentioning
confidence: 99%
“…In addition, SRBE makes typical Sybil attacks [60,76] harder on GROUPSENSE, by restricting participants to use one pseudoID at a given time interval. In Sybil attack [60], a participatory node illegitimately claims multiple identities.…”
Section: Groupsense Operationsmentioning
confidence: 99%
“…By moving the window, the attacker tracks the victim. In the Waze DDoS Attack, the malicious customer impersonates multiple WAZE vehicles in a small area, simulating traffic bottleneck [12].…”
Section: Security Problem: Privacy Violations In V2i Communicationsmentioning
confidence: 99%