Toward a Secure Crowdsourced Location Tracking System

06/01/2021
by   Chinmay Garg, et al.
0

Low-energy Bluetooth devices have become ubiquitous and widely used for different applications. Among these, Bluetooth trackers are becoming popular as they allow users to track the location of their physical objects. To do so, Bluetooth trackers are often built-in within other commercial products connected to a larger crowdsourced tracking system. Such a system, however, can pose a threat to the security and privacy of the users, for instance, by revealing the location of a user's valuable object. In this paper, we introduce a set of security properties and investigate the state of commercial crowdsourced tracking systems, which present common design flaws that make them insecure. Leveraging the results of our investigation, we propose a new design for a secure crowdsourced tracking system (SECrow), which allows devices to leverage the benefits of the crowdsourced model without sacrificing security and privacy. Our preliminary evaluation shows that SECrow is a practical, secure, and effective crowdsourced tracking solution

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/14/2019

Spy the little Spies - Security and Privacy issues of Smart GPS trackers

Tracking expensive goods and/or targeted individuals with high-tech devi...
research
04/11/2020

Secure protocol to protect location privacy in distance calculation

Several applications require computing distances between different peopl...
research
11/20/2022

Who Tracks Who? A Surveillance Capitalist Examination of Commercial Bluetooth Tracking Networks

Object and person tracking networks powered by Bluetooth and mobile devi...
research
03/03/2021

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

Overnight, Apple has turned its hundreds-of-million-device ecosystem int...
research
10/26/2022

Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System

We present a detailed privacy analysis of Samsung's Offline Finding (OF)...
research
10/14/2020

Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links

In this paper, we investigate physical-layer security (PLS) methods for ...
research
04/24/2019

Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation

In recent versions of iOS, Apple has incorporated new wireless protocols...

Please sign up or login with your details

Forgot password? Click here to reset