2018
DOI: 10.1109/tnet.2018.2818073
|View full text |Cite
|
Sign up to set email alerts
|

Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 33 publications
0
16
0
Order By: Relevance
“…Those selected for full review were perceived to potentially include all these areas. However, only one paper was found to address vulnerabilities of a modern travel/navigation service [22] in which the authors explored security vulnerabilities of the Waze app. They were able to spoof vehicles to manipulate congestion predictions and affect routing and were also able to track individual users through unique identifiers used by Waze.…”
Section: Resultsmentioning
confidence: 99%
“…Those selected for full review were perceived to potentially include all these areas. However, only one paper was found to address vulnerabilities of a modern travel/navigation service [22] in which the authors explored security vulnerabilities of the Waze app. They were able to spoof vehicles to manipulate congestion predictions and affect routing and were also able to track individual users through unique identifiers used by Waze.…”
Section: Resultsmentioning
confidence: 99%
“…The key idea is to let nodes vouch for each other's presence, form a graph of evidence of which nodes can attest to the physical presence of which other nodes, and perform Sybil detection on this graph. Techniques for doing this have been proposed in [7,19] which we detail next, as they are most similar to our proposed approach.…”
Section: Current State Of Countermeasuresmentioning
confidence: 99%
“…Unfortunately, this anonymity allows an adversary to participate in the network and employ deliberate disinformation, corrupting the Server's data and misguiding its decision-making. While this problem is fundamental to anonymous systems, it is greatly exacerbated in this case by the fact that messages do not even have to originate from physical devices [7]. An adversary in possession of multiple sensors may forge fake messages and inject them into the network at a purely-software level.…”
mentioning
confidence: 99%
“…These could be, of course, rooted smartphones, a smartphone emulator or a botnet. This way, the Mapping Services [32] has introduced and performed the sybil attack on Waze, a popular crowdsourced map service, by using an emulator to create the number of virtual devices and to use these virtual devices for reporting false congestion and accidents, and automatically rerouting user traffic.…”
Section: Hardened Registration Processmentioning
confidence: 99%