|
|
NeTS: Medium: Collaborative Research: Secure and Usable Indoor Navigation for Individuals with Visual Impairment
Sponsored by the U.S. National Science Foundation (Awards # CNS-1514381 and CNS-1700039)
Duration: 09/01/2015-08/31/2020
|
|
|
|
|
Welcome to the website of our research project: "NeTS: Medium: Collaborative Research: Secure and Usable Indoor Navigation for Individuals with Visual Impairment". This project is a collaborative effort Arizona State University of Arizona and University of Delaware. This website is created and maintained to disseminate and share research results and other information related to the project.
Project Description
Despite significant effort on novel wireless and mobile applications for sighted people, novel wireless and mobile applications to improve the wellbeing of visually impaired individuals remain largely underexplored. The biggest everyday challenge for visually impaired individuals is safe and quick navigation to reach a desired destination in unfamiliar outdoor/indoor environments. Outdoor navigation for unsighted people can be greatly facilitated by GPS-based aids which unfortunately do not work in indoor environments lack of GPS signals. This proposal outlines a challenging research plan on developing, prototyping, and evaluating a secure and usable indoor navigation system for the visually impaired. The scientific promise of the proposed research will expand the fundamental understandings about indoor navigation for the visually impaired with the potential to open a new research direction. Successful development and implementations of the proposed techniques will have profound impact on allowing visually impaired individuals to have indoor navigation and wayfinding as sighted people, thus significantly improving the mobility and wellbeing of millions of visually impaired users in the US and around the world.
The proposed research consists of six main research thrusts. The first thrust is to investigate novel crowdsourcing-based techniques to construct accurate indoor floor plans for arbitrary indoor venues with or without large open spaces. The second thrust is to develop secure cooperative techniques to detect and minimize the impact of fake mobility traces submitted by dishonest crowdsourcing workers. The third thrust is to investigate crowdsourcing-based construction of an indoor image database that can well characterize and visualize an indoor venue. The fourth thrust is to develop crowdsourcing-based techniques to enable accurate point-to-point indoor navigation for the visually impaired. The fifth thrust is to investigate novel techniques that can provide visually impaired individuals enhanced indoor navigation experience similar to what sighted persons can get. The last thrust is to implement the proposed indoor navigation system and thoroughly evaluate its efficacy, efficiency, and usability.
Personnel
Principal Investigators
|
Dr. Yanchao Zhang (Lead PI)
Associate Professor
School of Electrical, Computer and Energy Engineering
Arizona State University
Email: yczhang@asu.edu
Homepage: http://cnsg.asu.edu/zhang/ |
|
Dr. Rui Zhang (PI)
Assistant Professor
Department of Computer and Information Sciences
University of Delaware
Email: ruizhang@udel.edu
Homepage: https://www.eecis.udel.edu/~ruizhang/ |
Co-Principal Investigator
|
Dr. Terri M. Hedgpeth
Director
Disability Resource Center
Arizona State University
Email: terrih@asu.edu
Homepage: |
Graduate Students
|
Lili Zhang
Ph.D. student
School of Electrical, Computer and Energy Engineering
Arizona State University
Email: lilizhang@asu.edu
Homepage: |
|
Tao Li
Ph.D. student
School of Electrical, Computer and Energy Engineering
Arizona State University
Email: tli@asu.edu
Homepage: |
|
Dianqi Han
Ph.D. student
School of Electrical, Computer and Energy Engineering
Arizona State University
Email: dqhan@asu.edu
Homepage: |
|
Yunzhi Li
Ph.D. student
Department of Computer and Information Sciences
University of Delaware
Email: liyunzhi@udel.edu
Homepage: |
|
Yidan Hu
Ph.D. student
Department of Computer and Information Sciences
University of Delaware
Email: yidanhu@udel.edu
Homepage: |
|
Lizhou Yuan (01/01/2017-05/31/2018)
Ph.D. student
Department of Computer and Information Sciences
University of Delaware
Email: lizhou@udel.edu
Homepage: |
|
Wenxin Chen (09/01/2015-07/31/2016)
Ph.D. student
Department of Electrical Engineering
University of Hawaii
Email: yidanhu@udel.edu
Homepage: |
Publications
-
IndoorWaze: A crowdsourcing-based context-aware indoor navigation system
Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth
IEEE Transactions on Wireless Communications, vol. 19, no. 8, pp. 5461-5472, Aug. 2020.
Summary: Indoor navigation systems are very useful in large complex indoor environments such as shopping malls. Current systems focus on improving indoor localization accuracy and must be
combined with an accurate labeled floor plan to provide usable indoor navigation services. Such labeled floor plans are often unavailable or involve a prohibitive cost to manually obtain.
In this paper, we present IndoorWaze, a novel crowdsourcing-based context-aware indoor navigation system that can automatically generate an accurate context-aware floor plan with labeled indoor
POIs for the first time in literature. IndoorWaze combines the Wi-Fi fingerprints of indoor walkers with the Wi-Fi fingerprints and POI labels provided by POI employees to produce a high-fidelity
labeled floor plan. As a lightweight crowdsourcing-based system, IndoorWaze involves very little effort from indoor walkers and POI employees. We prototype IndoorWaze on Android smartphones and
evaluate it in a large shopping mall. Our results show that IndoorWaze can generate a high-fidelity labeled floor plan, in which all the stores are correctly labeled and arranged,
all the pathways and crossings are correctly shown, and the median estimation error for the store dimension is below 12%.
A spatiotemporal approach for secure crowdsourced Radio Environment Map construction
Yidan Hu and Rui Zhang
IEEE/ACM Transactions on Networking, vol. 28, no. 4, pp. 1790-1803, Aug. 2020.
Summary: Database-driven Dynamic Spectrum Sharing (DSS) is the de-facto technical paradigm adopted by Federal Communications Commission for increasing spectrum efficiency, which allows licensed spectrum to be opportunistically used by secondary users. In database-driven DSS, a geo-location database administrator (DBA) maintains spectrum availability information over its service region in the form of a Radio Environment Map (REM), where the received signal strength from the primary user at every location is either directly measured via spectrum sensing or estimated via statistical spatial interpolation. Crowdsourcing-based spectrum sensing is a promising approach for periodically collecting spectrum measurements over a large geographic area but is unfortunately vulnerable to false spectrum measurements. Despite a large body of prior work on secure cooperative spectrum sensing, how to construct an accurate REM in the presence of false measurements remains an open challenge. In this paper, we introduce ST-REM, a novel spatiotemporal approach for securely constructing an REM in the presence of false spectrum measurements. Inspired by the self-label techniques developed for semi-supervised learning, ST-REM iteratively constructs an REM from a small number of spectrum measurements from trusted anchor sensors and many more measurements from mobile users. During each iteration, the DBA evaluates the trustworthiness of each measurement by jointly considering its spatial fitness with other trusted measurements and the mobile user's long-term behavior. By gradually incorporating the most trustworthy spectrum measurements, the DBA is able to construct a REM with high accuracy. Extensive simulation studies using a real spectrum measurement dataset confirm the efficacy and efficiency of ST-REM.
-
Secure Indoor Positioning Against Signal Strength Attacks Via
Optimized Multi-voting
Yunzhi Li, Yidan Hu, Rui Zhang, Yanchao Zhang, Terri Hedgpeth
IEEE/ACM International Symposium on Quality of Service ( IWQoS), 2019.
Summary: Indoor positioning systems (IPSes) can enable many location-based
services in large indoor venues where GPS signals are unavailable
or unreliable. Among the most viable types of IPSes, RSS-IPSes rely
on ubiquitous smartphones and indoor WiFi infrastructures and explore distinguishable received signal strength (RSS) measurements
at different indoor locations as their location fingerprints. RSSIPSes are unfortunately vulnerable to physical-layer RSS attacks
that cannot be thwarted by conventional cryptographic techniques.
Existing defenses against RSS attacks are all subject to an inherent
tradeoff between indoor positioning accuracy and attack resilience.
This paper presents the design and evaluation of MV-IPS, a novel
RSS-IPS based on weighted multi-voting, which does not suffer
from this tradeoff. In MV-IPS, every WiFi access point (AP) that
receives a user’s RSS measurement gives a weighted vote for every
reference location, and the reference location that receives the highest accumulative votes from all APs is output as the user’s most
likely position. Trace-driven simulation studies based on real RSS
measurements demonstrate that MV-IPS can achieve much higher
positioning accuracy than prior solutions no matter whether RSS
attacks are present.
-
WristUnlock: Secure and Usable Smartphone
Unlocking with Wrist Wearables
Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, and Yanchao Zhang
IEEE Conference on Communications and Network Security ( CNS), 2019.
Summary: We propose WristUnlock, a novel technique that uses
a wrist wearable to unlock a smartphone in a secure and usable
fashion. WristUnlock explores both the physical proximity and
secure Bluetooth connection between the smartphone and wrist
wearable. There are two modes in WristUnlock with different
security and usability features. In the WristRaise mode, the user
raises his smartphone in his natural way with the same arm
carrying the wrist wearable; the smartphone gets unlocked if the
acceleration data on the smartphone and wrist wearable satisfy
an anticipated relationship specific to the user himself. In the
WristTouch mode, the wrist wearable sends a random number
to the smartphone through both the Bluetooth channel and a
touch-based physical channel; the smartphone gets unlocked if the
numbers received from both channels are equal. We thoroughly
analyze the security of WristUnlock and confirm its high efficacy
through detailed experiments.
-
Secure RSS-fingerprint-based indoor positioning: attacks and countermeasures
Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth
IEEE Conference on Communications and Network Security ( CNS), 2018.
Summary: Indoor positioning systems (IPS) based on RSS
fingerprints have received significant attention in recent years,
but they are unfortunately vulnerable to RSS attacks that cannot
be thwarted by conventional cryptographic means. In this paper,
we identify two practical RSS attacks on RSS-fingerprint-based
IPS (RSS-IPS). In both attacks, the attacker learns the RSSfingerprint
database at the IPS server by acting as a normal
user repeatedly issuing location queries and then impersonates
selected APs with fake ones under his control. By carefully tuning
the locations and transmission power of fake APs, the attacker
is able to control the RSS experienced by victim users at target
locations, leading to either a large location error or the IPS server
misled into returning a fake location of the attacker’s choice.
We further design a fingerprint-matching mechanism based on
a novel truncated distance metric as the countermeasure. Tracedriven
simulation studies based on real RSS measurement data
demonstrate the severe impact of the proposed attacks and also
the effectiveness of our countermeasure.
Secure crowdsourced indoor positioning systems
Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth
International Conference on Computer Communications ( INFOCOM), 2018.
Summary: Indoor positioning systems (IPSes) can enable many location-based services in large indoor environments where GPS is not available or reliable. Mobile crowdsourcing is widely advocated as an effective way to construct IPS maps. This paper presents the first systematic study of security issues in crowdsourced WiFi-based IPSes to promote security considerations in designing and deploying crowdsourced IPSes. We identify three attacks on crowdsourced WiFi-based IPSes and propose the corresponding countermeasures. The efficacy of the attacks and also our countermeasures are experimentally validated on a prototype system. The attacks and countermeasures can be easily extended to other crowdsourced IPSes.
-
EyeTell: video-assisted touchscreen keystroke inference from eye movements
Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth
IEEE Symposium on Security and Privacy ( S&P), 2018.
Summary: Keystroke inference attacks pose an increasing
threat to ubiquitous mobile devices. This paper presents EyeTell, a
novel video-assisted attack that can infer a victim’s keystrokes on
his touchscreen device from a video capturing his eye movements.
EyeTell explores the observation that human eyes naturally focus
on and follow the keys they type, so a typing sequence on a
soft keyboard results in a unique gaze trace of continuous eye
movements. In contrast to prior work, EyeTell requires neither
the attacker to visually observe the victim’s inputting process nor
the victim device to be placed on a static holder. Comprehensive
experiments on iOS and Android devices confirm the high efficacy
of EyeTell for inferring PINs, lock patterns, and English words
under various environmental conditions.
-
Secure crowdsourced Radio Environment Map construction
Yidan Hu and Rui Zhang
IEEE International Conference on Network Protocols ( ICNP), 2017.
Summary: Database-driven Dynamic Spectrum Sharing (DSS)
is the de-facto technical paradigm adopted by Federal Communications
Commission (FCC) for increasing spectrum efficiency.
In such a system, a geo-location database administrator (DBA)
maintains spectrum availability information over its service region
whereby to determines whether a secondary user can access
a licensed spectrum band at his desired location and time. To
maintain spectrum availability in its service region, it is desirable
for the DBA to periodically collect spectrum measurements
whereby to construct and maintain a Radio Environment Map
(REM), where the received signal strength at every location
of interest is either directly measured or estimated via proper
statistical spatial interpolation techniques. Crowdsourcing-based
spectrum sensing is a promising approach for periodically collecting
spectrum measurements over a large geographic area, which
is, unfortunately, vulnerable to false spectrum measurements.
How to construct an accurate REM in the presence of false
measurements remains an open challenge. This paper introduces
SecREM, a novel scheme for securely constructing a REM in
the presence of false spectrum measurements. SecREM relies on
a small number of trusted spectrum measurements whereby to
evaluate the trustworthiness of the measurements from mobile
users and gradually incorporate the most trustworthy ones to
construct an accurate REM. Extensive simulation studies based
on a real spectrum measurement dataset confirm the efficacy and
efficiency of SecREM.
-
Your face your feart: Secure mobile face authentication with photoplethysmograms
Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang
IEEE International Conference on Computer Communications ( INFOCOM), 2017.
Summary: Face authentication emerges as a powerful method
for preventing unauthorized access to mobile devices. It is, however,
vulnerable to photo-based forgery attacks (PFA) and videobased
forgery attacks (VFA), in which the adversary exploits
a photo or video containing the user’s frontal face. Effective
defenses against PFA and VFA often rely on liveness detection,
which seeks to find a live indicator that the submitted face photo
or video of the legitimate user is indeed captured in real time. In
this paper, we propose FaceHeart, a novel and practical face authentication
system for mobile devices. FaceHeart simultaneously
takes a face video with the front camera and a fingertip video
with the rear camera on COTS mobile devices. It then achieves
liveness detection by comparing the two photoplethysmograms
independently extracted from the face and fingertip videos, which
should be highly consistent if the two videos are for the same live
person and taken at the same time. As photoplethysmograms
are closely tied to human cardiac activity and almost impossible
to forge or control, FaceHeart is strongly resilient to PFA and
VFA. Extensive user experiments on Samsung Galaxy S5 have
confirmed the high efficacy and efficiency of FaceHeart.
-
POWERFUL: Mobile app fingerprinting via power analysis
Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang
IEEE International Conference on Computer Communications ( INFOCOM), 2017.
Summary: Which apps a mobile user has and how they are
used can disclose significant private information about the user. In
this paper, we present the design and evaluation of POWERFUL,
a new attack which can fingerprint sensitive mobile apps (or infer
sensitive app usage) by analyzing the power consumption profiles
on Android devices. POWERFUL works on the observation that
distinct apps and their different usage patterns all lead to distinguishable
power consumption profiles. Since the power profiles on
Android devices require no permission to access, POWERFUL is
very difficult to detect and can pose a serious threat against user
privacy. Extensive experiments involving popular and sensitive
apps in Google Play Store show that POWERFUL can identify
the app used at any particular time with accuracy up to 92.9%,
demonstrating the feasibility of POWERFUL.
-
Verifiable Social Data Outsourcing
Xin Yao, Rui Zhang, Yanchao Zhang, and Yaping Lin
IEEE International Conference on Computer Communications ( INFOCOM), 2017.
Summary: Social data outsourcing is an emerging paradigm
for effective and efficient access to the social data. In such
a system, a third-party Social Data Provider (SDP) purchases
complete social datasets from Online Social Network (OSN)
operators and then resells them to data consumers who can
be any individuals or entities desiring the complete social data
satisfying some criteria. The SDP cannot be fully trusted and
may return wrong query results to data consumers by adding
fake data and deleting/modifying true data in favor of the
businesses willing to pay. In this paper, we initiate the study
on verifiable social data outsourcing whereby a data consumer
can verify the trustworthiness of the social data returned by
the SDP. We propose three schemes for verifiable queries over
outsourced social data. The three schemes all require the OSN
provider to generate some cryptographic auxiliary information,
based on which the SDP can construct a verification object for
the data consumer to verify the query-result trustworthiness.
They differ in how the auxiliary information is generated and
how the verification object is constructed and verified. Extensive
experiments based on a real Twitter dataset confirm the high
efficacy and efficiency of our schemes.
-
DPSense: Differentially private crowdsourced spectrum sensing
Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang
ACM Conference on Computer and Communications Security ( CCS), 2016.
Summary: Dynamic spectrum access (DSA) has great potential to address
worldwide spectrum shortage by enhancing spectrum efficiency.
It allows unlicensed secondary users to access the underutilized
licensed spectrum when the licensed primary users are not transmitting.
As a key enabler for DSA systems, crowdsourced spectrum
sensing (CSS) allows a spectrum sensing provider (SSP) to
outsource the sensing of spectrum occupancy to distributed mobile
users. In this paper, we propose DPSense, a novel framework that
allows the SSP to select mobile users for executing spatiotemporal
spectrum-sensing tasks without violating the location privacy of
mobile users. Detailed evaluations on real location traces confirm
that DPSense can provide differential location privacy to mobile
users while ensuring that the SSP can accomplish spectrum-sensing
tasks with overwhelming probability and also the minimal cost.
-
iLock: Immediate and automatic locking of mobile
devices against data theft
Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, and Yanchao Zhang
ACM Conference on Computer and Communications Security ( CCS), 2016.
Summary: Mobile device losses and thefts are skyrocketing. The sensitive
data hosted on a lost/stolen device are fully exposed
to the adversary. Although password-based authentication
mechanisms are available on mobile devices, many users reportedly
do not use them, and a device may be lost/stolen
while in the unlocked mode. This paper presents the design
and evaluation of iLock, a secure and usable defense
against data theft on a lost/stolen mobile device. iLock
automatically, quickly, and accurately recognizes the user’s
physical separation from his/her device by detecting and
analyzing the changes in wireless signals. Once significant
physical separation is detected, the device is immediately
locked to prevent data theft. iLock relies on acoustic signals
and requires at least one speaker and one microphone
that are available on most COTS (commodity-off-the-shelf)
mobile devices. Extensive experiments on Samsung Galaxy
S5 show that iLock can lock the device with negligible false
positives and negatives.
-
VISIBLE: Video-Assisted Keystroke Inference from
Tablet Backside Motion
Jingchao Sun, Xiaocong Jin, Yimin Chen, Jinxue Zhang, Rui Zhang, and Yanchao Zhang
ISOC Network and Distributed System Security Symposium ( NDSS), 2016.
Summary: The deep penetration of tablets in daily life has
made them attractive targets for keystroke inference attacks that
aim to infer a tablet user’s typed inputs. We propose
VISIBLE, a novel video-assisted keystroke inference framework
to infer a tablet user’s typed inputs from surreptitious video
recordings of tablet backside motion. VISIBLE is built upon
the observation that the keystrokes on different positions of
the tablet’s soft keyboard cause its backside to exhibit different
motion patterns. VISIBLE uses complex steerable pyramid decomposition
to detect and quantify the subtle motion patterns of
the tablet backside induced by a user’s keystrokes, differentiates
different motion patterns using a multi-class Support Vector
Machine, and refines the inference results using a dictionary
and linguistic relationship. Extensive experiments demonstrate
the high efficacy of VISIBLE for inferring single keys, words,
and sentences. In contrast to previous keystroke inference attacks,
VISIBLE does not require the attacker to visually see the tablet
user’s input process or install any malware on the tablet.
-
Privacy-Preserving Crowdsourced Spectrum Sensing
Xiaocong Jin and Yanchao Zhang
IEEE International Conference on Computer Communications ( INFOCOM), 2016.
Summary: Crowdsourced spectrum sensing has great potential
in improving current spectrum database services. Without strong
incentives and location privacy protection in place, however,
mobile users will be reluctant to act as mobile crowdsourcing
workers for spectrum sensing tasks. In this paper, we present
PriCSS, the first framework for a crowdsourced spectrum sensing
service provider to select spectrum-sensing participants in a
differentially privacy-preserving manner. Thorough theoretical
analysis and simulation studies show that PriCSS can simultaneously
achieve differential location privacy, approximate social
cost minimization, and truthfulness.
-
Secure Outsourced Skyline Query Processing via
Untrusted Cloud Service Providers
Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, and Shubo Liu
IEEE International Conference on Computer Communications ( INFOCOM), 2016.
Summary: Recent years have witnessed a growing number of
location-based service providers (LBSPs) outsourcing their points
of interest (POI) datasets to third-party cloud service providers
(CSPs), which in turn answer various data queries from mobile
users on their behalf. A main challenge in such systems is that the
CSPs cannot be fully trusted, which may return fake query results
for various bad motives, e.g., in favor of POIs willing to pay.
As an important type of queries, location-based skyline queries
(LBSQ) ask for the POIs that are not spatially dominated by any
other POI with respect to some query position. To tackle this challenge, we
propose three novel schemes that enable efficient verification of
any LBSQ result returned by an untrusted CSP by embedding
and exploring a novel neighboring relationship among POIs. The
efficacy and efficiency of our schemes are thoroughly analyzed
and evaluated.
-
PriStream: Privacy-Preserving Distributed Stream
Monitoring of Thresholded Percentile Statistics
Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang
IEEE International Conference on Computer Communications ( INFOCOM), 2016.
Summary: Distributed stream monitoring has numerous potential
applications in future smart cities. Communication efficiency
and data privacy are two main challenges for distributed stream
monitoring services. We propose PriStream, the
first communication-efficient and privacy-preserving distributed
stream monitoring system for thresholded PERCENTILE
aggregates. PriStream allows the monitoring service provider
to evaluate an arbitrary function over a desired percentile of
distributed data reports and monitor when the output exceeds
a predetermined system threshold. Detailed theoretical analysis
and evaluations show that PriStream has high accuracy and
communication efficiency, and differential privacy guarantees
under a strong adversary model.
-
PriExpress: Privacy-Preserving Express Delivery
with Fine-Grained Attribute-Based Access Control
Tao Li, Rui Zhang, and Yanchao Zhang
IEEE Conference on Communications and Network Security ( CNS), 2016. (accepted)
Summary: With the fast development of mobile Internet, ecommerce
has been widely applied to the living of the masses. Because
of the strong dependence of e-commerce, logistics industry
has attracted much attention. However, when users get convenient
service from the logistics industry, their privacy is compromised.
Addresses, phone numbers and other private information on
the parcel are accessible to anyone. Moreover, because users’
logistics data is stored in plaintext in the companies’ servers, it is
vulnerable to the peep from staffs in the company and even the
Hackers. We propose the first logistics system, PriExpress,
which protects the users’ privacy and ensures the efficient delivery
of the parcel at the same time. To address the above problem, we
improved attribute based encryption with a hidden access tree.
Based on users’ attributes, we enforce fine-grained access control
on the logistic data. Our security and performance analysis shows
that PriExpress is both secure and efficient.
-
SecureFind: Secure and Privacy-Preserving
Object Finding via Mobile Crowdsourcing
Jingchao Sun, Rui Zhang, Xiaocong Jin, and Yanchao Zhang
IEEE Transactions on Wireless Communications. ( TWC), vol. 15, no. 3, pp. 1716-1728, March 2016.
Summary: The plummeting cost of Bluetooth tags and the ubiquity of mobile devices are revolutionizing the traditional lost-and-found
service. We propose SecureFind, a secure and privacy-preserving object-finding system via mobile crowdsourcing. In
SecureFind, a unique Bluetooth tag is attached to every valuable object, and the owner of a lost object submits an object-finding
request to many mobile users via the SecureFind service provider. Each mobile user involved searches his vicinity for the lost object on
behalf of the object owner who can infer the location of his lost object based on the responses from mobile users. SecureFind is
designed to ensure strong object security such that only the object owner can discover the location of his lost object as well as offering
location privacy to mobile users involved. The high efficacy and efficiency of SecureFind are confirmed by extensive simulations.
-
Privacy-Preserving Spatiotemporal Matching for
Secure Device-to-Device Communications
Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang
IEEE Internet of Things Journal. ( IOT), 2016. (accepted)
Summary: Device-to-device (D2D) communications are emerging
due to the explosive growth of smartphones and tablets.
Given the possible presence of attackers, a fundamental challenge
in secure D2D communications is to develop sound mobile
authentication techniques whereby mobile users can select the
most trustworthy D2D communication partners from possibly
many candidates. We tackle this open challenge and
proposes spatiotemporal matching as a promising enabler for
secure D2D communications. Spatiotemporal matching is built
upon the location-aware capability of D2D devices. In particular,
a mobile user could very easily maintain his spatiotemporal
profile recording his continuous whereabouts in time, and the
level of his spatiotemporal profile matching that of the other
user can be translated into the level of trust they two can have
in each other. Since spatiotemporal profiles contain very sensitive
personal information, privacy-preserving spatiotemporal matching
is needed to ensure that as little information as possible
about the spatiotemporal profile of either matching participant
is disclosed beyond the matching result. Towards this end, we
propose two novel privacy-preserving spatiotemporal matching
protocols, which are thoroughly analyzed and evaluated through
detailed simulation studies driven by experimental data.
Disclaimer: The papers here are made available for timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
|
|
|
|