Toward a Secure Crowdsourced Location Tracking System

Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Downloads (Pure)

Abstract

Low-energy Bluetooth devices have become ubiquitous and widely used for different applications. Among these, Bluetooth trackers are becoming popular as they allow users to track the location of their physical objects. To do so, Bluetooth trackers are often built-in within other commercial products connected to a larger crowdsourced tracking system. Such a system, however, can pose a threat to the security and privacy of the users, for instance, by revealing the location of a user's valuable object. In this paper, we introduce a set of security properties and investigate the state of commercial crowdsourced tracking systems, which present common design flaws that make them insecure. Leveraging the results of our investigation, we propose a new design for a secure crowdsourced tracking system (SECrow), which allows devices to leverage the benefits of the crowdsourced model without sacrificing security and privacy. Our preliminary evaluation shows that SECrow is a practical, secure, and effective crowdsourced tracking solution
Original languageEnglish
Title of host publication14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
Pages311-322
Number of pages12
ISBN (Electronic)9781450383493
DOIs
Publication statusPublished - 28 Jun 2021
Event14th ACM Conference on Security and Privacy in Wireless and Mobile Networks - Vitual Event
Duration: 28 Jun 20212 Jul 2021
Conference number: 14
https://sites.nyuad.nyu.edu/wisec21/

Conference

Conference14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Abbreviated titleWiSec 2021
CityVitual Event
Period28/06/212/07/21
Internet address

Keywords

  • Cybersecurity

Fingerprint

Dive into the research topics of 'Toward a Secure Crowdsourced Location Tracking System'. Together they form a unique fingerprint.

Cite this