2018
DOI: 10.1109/tvt.2018.2800123
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Violation via GPS-agnostic Smart Phone Car Tracking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…While GNSS provides the vehicle's location directly to apps, privacy conscious users may disable localisation while giving access to other sensors that do not present obvious privacy issues. For example, in [50] a magnetometer is used to detect changes in the driving angle and then map those changes onto a potential route.…”
Section: G Behavioural Datamentioning
confidence: 99%
“…While GNSS provides the vehicle's location directly to apps, privacy conscious users may disable localisation while giving access to other sensors that do not present obvious privacy issues. For example, in [50] a magnetometer is used to detect changes in the driving angle and then map those changes onto a potential route.…”
Section: G Behavioural Datamentioning
confidence: 99%
“…• Location tracking via sensor data (e.g., magnetometer [60]) • Data harvesting • Become internal attack vector for remote adversary • Malicious smartphone app interfering with CAN bus [57]…”
Section: Example Attacksmentioning
confidence: 99%
“…The preventive measures like engine ignition cutoff, Fuel offer cutoff, electrical shock system and paint spray system area unit put in within the vehicle that is controlled victimization user GSM Mobile. Zi Li et al [10] in a paper "Location Privacy Violation via GPS-agnostic Smart Phone Car Tracking" demonstrate that an assailant continues to be able to track someone by victimization the embedded meter detector in victim's good phone, even once the GPS module is disabled all the time. During this paper a replacement attack that uses a wise phone to trace a automotive while not requesting access to GPS module on this phone.…”
Section: Literature Surveymentioning
confidence: 99%