Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement

Anum Arshad, Haider Abbas, W. Shahid, Anique Azhar
{"title":"Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement","authors":"Anum Arshad, Haider Abbas, W. Shahid, Anique Azhar","doi":"10.1109/WETICE49692.2020.00029","DOIUrl":null,"url":null,"abstract":"Location-based services have exponentially escalated in the past few decades. They appear to be very practical, however, the location of user is constantly being tracked, hoarded, and monitored by tech giants without user knowledge and consent. Google keeps an eye on every motion of its users, irrespective of their security settings. For this study, various Android smartphones were carried through different places for one week without the availability of internet and location services. Later, thorough network traffic analysis revealed that the archived data collected by Google apps and services, contained location data as well. This data is transferred to Google as soon as the internet connection becomes available. Moreover, a detailed performance analysis of existing fake GPS location applications was conducted that revealed a plethora of weaknesses in their performance and none of them aimed to secure users’ real location coordinates. In this paper, we present an interesting solution to obfuscate Android users’ real location coordinates, even in off-line mode, thereby, guaranteeing location privacy.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE49692.2020.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Location-based services have exponentially escalated in the past few decades. They appear to be very practical, however, the location of user is constantly being tracked, hoarded, and monitored by tech giants without user knowledge and consent. Google keeps an eye on every motion of its users, irrespective of their security settings. For this study, various Android smartphones were carried through different places for one week without the availability of internet and location services. Later, thorough network traffic analysis revealed that the archived data collected by Google apps and services, contained location data as well. This data is transferred to Google as soon as the internet connection becomes available. Moreover, a detailed performance analysis of existing fake GPS location applications was conducted that revealed a plethora of weaknesses in their performance and none of them aimed to secure users’ real location coordinates. In this paper, we present an interesting solution to obfuscate Android users’ real location coordinates, even in off-line mode, thereby, guaranteeing location privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过实时持续欺骗Android用户的位置坐标来欺骗窃听者,以增强隐私
在过去的几十年里,基于位置的服务呈指数级增长。它们看起来非常实用,然而,在用户不知情和不同意的情况下,用户的位置被科技巨头不断跟踪、囤积和监控。不管用户的安全设置如何,谷歌都会密切关注他们的一举一动。在这项研究中,不同的安卓智能手机被带到不同的地方一周,没有互联网和定位服务。后来,彻底的网络流量分析显示,谷歌应用程序和服务收集的存档数据也包含位置数据。一旦互联网连接可用,这些数据就会传输给谷歌。此外,对现有虚假GPS定位应用程序进行了详细的性能分析,发现它们的性能存在大量弱点,而且没有一个旨在确保用户的真实位置坐标。在本文中,我们提出了一个有趣的解决方案,即使在离线模式下,也可以混淆Android用户的真实位置坐标,从而保证位置隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards an Automatic Identification of Microservices from Business Processes A FIPA-ACL based communication utility for Unity Secure Data Analytics for IoT Cloud-enabled Framework Using Intel SGX Application and preliminary evaluation of Anontool applied in the anomaly detection module Specification and verification of railway safety-critical systems using TLA+: A Case Study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1