SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing

The plummeting cost of Bluetooth tags and the ubiquity of mobile devices are revolutionizing the traditional lost-and-found service. This paper presents SecureFind, a secure and privacy-preserving object-finding system via mobile crowdsourcing. In SecureFind, a unique Bluetooth tag is attached to every valuable object, and the owner of a lost object submits an object-finding request to many mobile users via the SecureFind service provider. Each mobile user involved searches his vicinity for the lost object on behalf of the object owner who can infer the location of his lost object based on the responses from mobile users. SecureFind is designed to ensure strong object security such that only the object owner can discover the location of his lost object as well as offering location privacy to mobile users involved. The high efficacy and efficiency of SecureFind are confirmed by extensive simulations.

[1]  Xu Chen,et al.  SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Bo Sheng,et al.  How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[3]  Cyrus Shahabi,et al.  A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing , 2014, Proc. VLDB Endow..

[4]  Dong Xuan,et al.  E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[5]  Feng Zhou,et al.  Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[6]  Vaidy S. Sunderam,et al.  Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[7]  Prashant J. Shenoy,et al.  Sherlock: automatically locating objects for humans , 2008, MobiSys '08.

[8]  Shigang Chen,et al.  Missing-Tag Detection and Energy–Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels , 2014, IEEE/ACM Transactions on Networking.

[9]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[10]  S. Rajsbaum Foundations of Cryptography , 2014 .

[11]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[12]  Shigang Chen,et al.  Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems , 2012, MobiHoc '12.

[13]  Xiang-Yang Li,et al.  How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[14]  Prabal Dutta,et al.  AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages , 2010, SenSys '10.

[15]  Jiming Chen,et al.  On Optimal Information Capture by Energy-Constrained Mobile Sensors , 2010, IEEE Transactions on Vehicular Technology.

[16]  John Zic,et al.  Secure Multihop Network Programming with Multiple One-Way Key Chains , 2008, IEEE Transactions on Mobile Computing.

[17]  Mo Li,et al.  P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing , 2013, IEEE/ACM Transactions on Networking.

[18]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[19]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[20]  Chi Zhang,et al.  Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[21]  H. Chernoff,et al.  The Use of Maximum Likelihood Estimates in {\chi^2} Tests for Goodness of Fit , 1954 .

[22]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[23]  Chi Zhang,et al.  Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Shiping Chen,et al.  Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Junshan Zhang,et al.  Joint sensing task and subband allocation for large-scale spectrum profiling , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[26]  Rui Zhang,et al.  Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.

[27]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[28]  Feng Qian,et al.  A close examination of performance and power characteristics of 4G LTE networks , 2012, MobiSys '12.

[29]  Rui Zhang,et al.  Privacy-preserving spatiotemporal matching , 2013, 2013 Proceedings IEEE INFOCOM.

[30]  Jin Zhang,et al.  Assigned Tree Slotted Aloha RFID Tag Anti-Collision Protocols , 2013, IEEE Transactions on Wireless Communications.

[31]  Chi Zhang,et al.  Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers , 2015, IEEE Transactions on Dependable and Secure Computing.

[32]  Xi Fang,et al.  Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.

[33]  Bo Sheng,et al.  Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.

[34]  Shigang Chen,et al.  Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.

[35]  Guang Gong,et al.  Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions , 2013, Asia Workshop on RFID Security.

[36]  Yehuda Lindell,et al.  More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.

[37]  Rui Zhang,et al.  Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[38]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.

[39]  Kai-Yeung Siu,et al.  Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.

[40]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.