Agility maneuvers to mitigate inference attacks on sensed location data
Sensed location data is subject to inference attacks by cybercriminals that aim to obtain the exact position of sensitive locations, such as the victim's home and work locations, to launch a variety of different attacks. Various Location-Privacy Preserving Mechanisms (LPPMs) exist to reduce the...
Saved in:
Published in | MILCOM IEEE Military Communications Conference pp. 259 - 264 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2016
|
Subjects | |
Online Access | Get full text |
ISSN | 2155-7586 |
DOI | 10.1109/MILCOM.2016.7795336 |
Cover
Abstract | Sensed location data is subject to inference attacks by cybercriminals that aim to obtain the exact position of sensitive locations, such as the victim's home and work locations, to launch a variety of different attacks. Various Location-Privacy Preserving Mechanisms (LPPMs) exist to reduce the probability of success of inference attacks on location data. However, such mechanisms have been shown to be less effective when the adversary is informed of the protection mechanism adopted, also known as white-box attacks. We propose a novel approach that makes use of targeted agility maneuvers as a more robust defense against white-box attacks. Agility maneuvers are systematically activated in response to specific system events to rapidly and continuously control the rate of change in system configurations and increase diversity in the space of readings, which would decrease the probability of success of inference attacks by an adversary. Experimental results, performed on a real data set, show that the adoption of agility maneuvers reduces the probability of success of white-box attacks to 2.68% on average, compared to 56.92% when using state-of-the-art LPPMs. |
---|---|
AbstractList | Sensed location data is subject to inference attacks by cybercriminals that aim to obtain the exact position of sensitive locations, such as the victim's home and work locations, to launch a variety of different attacks. Various Location-Privacy Preserving Mechanisms (LPPMs) exist to reduce the probability of success of inference attacks on location data. However, such mechanisms have been shown to be less effective when the adversary is informed of the protection mechanism adopted, also known as white-box attacks. We propose a novel approach that makes use of targeted agility maneuvers as a more robust defense against white-box attacks. Agility maneuvers are systematically activated in response to specific system events to rapidly and continuously control the rate of change in system configurations and increase diversity in the space of readings, which would decrease the probability of success of inference attacks by an adversary. Experimental results, performed on a real data set, show that the adoption of agility maneuvers reduces the probability of success of white-box attacks to 2.68% on average, compared to 56.92% when using state-of-the-art LPPMs. |
Author | Marvel, Lisa M. Petracca, Giuseppe Jaeger, Trent Swami, Ananthram |
Author_xml | – sequence: 1 givenname: Giuseppe surname: Petracca fullname: Petracca, Giuseppe email: gxp18@cse.psu.edu organization: Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA – sequence: 2 givenname: Lisa M. surname: Marvel fullname: Marvel, Lisa M. email: marvel@ieee.org organization: Res. Lab., US Army, Aberdeen Proving Ground, MD, USA – sequence: 3 givenname: Ananthram surname: Swami fullname: Swami, Ananthram email: ananthram.swami.civ@mail.mil organization: Res. Lab., US Army, Aberdeen Proving Ground, MD, USA – sequence: 4 givenname: Trent surname: Jaeger fullname: Jaeger, Trent email: tjaeger@cse.psu.edu organization: Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA |
BookMark | eNotj8tKw0AUQEdRsK39gm7mBxLvzGRey1K0FlK60XW5SW_KaDKRzCj07xXs6nA2B86c3cUxEmMrAaUQ4J_2u3pz2JcShCmt9Vopc8PmQoMHZZ2AWzaTQuvCamce2DKlDwAQ0hnpxYxt1-fQh3zhA0b6_qEp8TzyIeRwxkw8xI4mii1xzBnbz8THyBPFRCfejy3m8OcnzPjI7jvsEy2vXLD3l-e3zWtRH7a7zbougrA6F6ioMY0XnfRKU6UbB5K8sdBiJRsPGpU3rbOVRI-Nb8C4Fo3tDBr0woFasNV_NxDR8WsKA06X4_Vb_QL_dU5s |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/MILCOM.2016.7795336 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1509037810 9781509037810 |
EISSN | 2155-7586 |
EndPage | 264 |
ExternalDocumentID | 7795336 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
ID | FETCH-LOGICAL-i175t-a3eb6b91f2935e45b802e9670ca42b905a396c8742a9ab9b068ca67f6a6a91803 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 01:58:19 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-a3eb6b91f2935e45b802e9670ca42b905a396c8742a9ab9b068ca67f6a6a91803 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7795336 |
PublicationCentury | 2000 |
PublicationDate | 2016-Nov. |
PublicationDateYYYYMMDD | 2016-11-01 |
PublicationDate_xml | – month: 11 year: 2016 text: 2016-Nov. |
PublicationDecade | 2010 |
PublicationTitle | MILCOM IEEE Military Communications Conference |
PublicationTitleAbbrev | MILCOM |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001286291 |
Score | 2.0318038 |
Snippet | Sensed location data is subject to inference attacks by cybercriminals that aim to obtain the exact position of sensitive locations, such as the victim's home... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 259 |
SubjectTerms | Computer security Distribution functions Global Positioning System Graphical models IEEE 802.11 Standard Mobile communication |
Title | Agility maneuvers to mitigate inference attacks on sensed location data |
URI | https://ieeexplore.ieee.org/document/7795336 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nWDho0V8ywMjSZ0mtuMRVZSCCDBQqVtluxdUoSYIkgF-PXYSSkEMbJYlny2fpbuz33sGONNhmg4kpZ5hPPUiw6gnGZt7thIwXAc4wEqdP7nj40l0M2XTFpyvuDCIWIHP0HfN6i1_npvSXZX1hXBgSN6Gtj1mNVdr7T7F5uYyaISFAir7yfXt8D5x6C3uNyN_fKFSRZDRFiRfc9fAkWe_LLRvPn7JMv53cdvQ--bqkYdVFNqBFma7sLkmM9iFq4snh4B9J0uVYelwGKTIyXJRyWsgWazsqKJwlHuSZ-TNlrc4Jy7UOdcRhyTtwWR0-Tgce80HCt7CZgWFp0LUXMvAeiNkGDEd0wFKLqhR0UBLylQouYltdayk0lJTHhvFRcoVVzKIabgHnSzPcB8IMwKFEsh1KmwFGSlu8wJtTTk1IBWyA-i6LZm91BoZs2Y3Dv_uPoIN55aa03cMneK1xBMb3At9Wnn1E38epCU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKGYCFR0G88cBIUudhOx5RRWmhKQyt1K2y3RtUoSYIkgG-HjsJpSAGNsuSH_Idzr32OccIXaogSXxBiKMpS5xQU-IISmeOqQQ0Ux74ULrzx0PWG4d3EzppoKulFgYASvIZuLZZvuXPMl3Yq7I255YMydbQusH9kFZqrZUbFZOdC6-2FvKIaMf9Qechtvwt5tZjf3yiUmJIdxvFX6tX1JFnt8iVqz9-GTP-d3s7aP9brYcflzi0ixqQ7qGtFaPBFrq9frIc2He8kCkUlomB8wwv5qXBBuD5ch6Z51Z0j7MUv5kCF2bYgp0NHrZc0n007t6MOj2n_kLBmZu8IHdkAIop4Zl4BBRCqiLig2CcaBn6ShAqA8F0ZOpjKaQSirBIS8YTJpkUXkSCA9RMsxQOEaaaA5ccmEq4qSFDyUxmoMxU1g9IBvQIteyRTF8ql4xpfRrHf3dfoI3eKB5MB_3h_QnatCGqFH6nqJm_FnBmoD5X52WEPwFIkqdy |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=MILCOM+IEEE+Military+Communications+Conference&rft.atitle=Agility+maneuvers+to+mitigate+inference+attacks+on+sensed+location+data&rft.au=Petracca%2C+Giuseppe&rft.au=Marvel%2C+Lisa+M.&rft.au=Swami%2C+Ananthram&rft.au=Jaeger%2C+Trent&rft.date=2016-11-01&rft.pub=IEEE&rft.eissn=2155-7586&rft.spage=259&rft.epage=264&rft_id=info:doi/10.1109%2FMILCOM.2016.7795336&rft.externalDocID=7795336 |