Issue No. 04 - July-Aug. (2017 vol. 14)
Yao Zheng , Department of Computer Science, Virginia Tech, Falls Church, VA
Ming Li , Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ
Wenjing Lou , Department of Computer Science, Virginia Tech, Falls Church, VA
Y. Thomas Hou , Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA
A location proximity test service allows mobile users to determine whether they are in close proximity to each other, and has found numerous applications in mobile social networks. Unfortunately, existing solutions usually reveal much of users’ private location information during a proximity test. They are also vulnerable to location cheating where an attacker reports false locations to gain an advantage. Moreover, the initial trust establishment among unfamiliar users in large scale mobile social networks has been a challenging task. In this paper, we propose a novel scheme that enables a user to perform (1) a location based handshake that establishes secure communications among strangers, who do not have a pre-shared secret, and (2) a privacy-preserving proximity test without revealing the user’s actual location to the server or other users not within the proximity. The proposed scheme is based on a novel concept, i.e., spatial-temporal location tags, and we put forward a location tag construction method using environmental signals that provides an unforgeable location proof. We use Bloom filters to efficiently represent users’ location tags and vicinity regions. We exploit fuzzy extractor, a lightweight cryptographic primitive, to extract shared secrets between matching location tags. We conduct extensive analysis, simulation, and real experiments to demonstrate the feasibility, security, and efficiency of our scheme.
Protocols, Entropy, Servers, Privacy, IEEE 802.11 Standard, Security, Mobile communication
Y. Zheng, M. Li, W. Lou and Y. T. Hou, "Location Based Handshake and Private Proximity Test with Location Tags," in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 4, pp. 406-419, 2017.