Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

We demonstrate a breach in smartphone location privacy through the accelerometer and magnetometer's footprints. The merits or otherwise of explicitly permissioned location sensors are not the point of this paper. Instead, our proposition is that other non-location-sensitive sensors can track users accurately when the users are in motion, as in travelling on public transport, such as trains, buses, and taxis. Through field trials, we provide evidence that high accuracy location tracking can be achieved even via non-location-sensitive sensors for which no access authorisation is required from users on a smartphone.

[1]  Triet Vo Huu,et al.  Inferring User Routes and Locations Using Zero-Permission Mobile Sensors , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[2]  N. Asokan,et al.  Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.

[3]  Di Ma,et al.  Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data , 2012, ESORICS.

[4]  Meinard Müller,et al.  Information retrieval for music and motion , 2007 .

[5]  Fei Shen,et al.  Privacy protection and self-disclosure across societies: A study of global Twitter users , 2017, New Media Soc..

[6]  Balachander Krishnamurthy,et al.  Privacy Leakage in Mobile Online Social Networks , 2010, WOSN.

[7]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[8]  Kat Krol,et al.  Don't work. Can't work? Why it's time to rethink security warnings , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[9]  Gerald Friedland,et al.  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.

[10]  Yu-Ping Wang,et al.  Sensor Guardian: prevent privacy inference on Android sensors , 2017, EURASIP J. Inf. Secur..

[11]  Jonathan D. Cryer,et al.  Time Series Analysis , 1986 .

[12]  Cecilia Mascolo,et al.  Mining users' significant driving routes with low-power sensors , 2014, SenSys.

[13]  Xiang Gao,et al.  Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).