Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services

Real-time crowdsourced maps, such as Waze provide timely updates on traffic, congestion, accidents, and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based Sybil devices that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More importantly, we describe techniques to generate Sybil devices at scale, creating armies of virtual vehicles capable of remotely tracking precise movements for large user populations while avoiding detection. To defend against Sybil devices, we propose a new approach based on co-location edges, authenticated records that attest to the one-time physical co-location of a pair of devices. Over time, co-location edges combine to form large proximity graphs that attest to physical interactions between devices, allowing scalable detection of virtual vehicles. We demonstrate the efficacy of this approach using large-scale simulations, and how they can be used to dramatically reduce the impact of the attacks. We have informed Waze/Google team of our research findings. Currently, we are in active collaboration with Waze team to improve the security and privacy of their system.

[1]  Vitaly Shmatikov,et al.  Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.

[2]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[3]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[4]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[5]  Christopher Krügel,et al.  Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.

[6]  Ben Y. Zhao,et al.  Whispers in the dark: analysis of an anonymous social network , 2014, Internet Measurement Conference.

[7]  Latifur Khan,et al.  SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.

[8]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[9]  Jack Brassil,et al.  Traffic Signature-Based Mobile Device Location Authentication , 2014, IEEE Transactions on Mobile Computing.

[10]  Marco Gruteser,et al.  USENIX Association , 1992 .

[11]  Tobias Jeske Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic , 2013 .

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[14]  Antonio Alfredo Ferreira Loureiro,et al.  Is it possible to find social properties in vehicular networks? , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[15]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[16]  Nikita Borisov,et al.  Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns , 2016, ArXiv.

[17]  Alec Wolman,et al.  I am a sensor, and I approve this message , 2010, HotMobile '10.

[18]  Iyad Rahwan,et al.  Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge , 2014, EPJ Data Science.

[19]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[20]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[21]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[22]  Nikita Borisov,et al.  Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.

[23]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[24]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[25]  Matthew Smith,et al.  Rethinking SSL development in an appified world , 2013, CCS.

[26]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[27]  Xue Liu,et al.  Location Cheating: A Security Challenge to Location-Based Social Network Services , 2011, 2011 31st International Conference on Distributed Computing Systems.

[28]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[29]  Claudio Soriente,et al.  Smartphones as Practical and Secure Location Verification Tokens for Payments , 2014, NDSS.

[30]  Bogdan Carbunar,et al.  You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[31]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[32]  Gang Wang,et al.  On the validity of geosocial mobility traces , 2013, HotNets.

[33]  Roberto Tamassia,et al.  Haze: privacy-preserving real-time traffic statistics , 2013, SIGSPATIAL/GIS.

[34]  Eran Yahav,et al.  Exploiting Social Navigation , 2014, ArXiv.

[35]  Sebastien Ardon,et al.  EMO: A statistical encounter-based mobility model for simulating delay tolerant networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[36]  Damon McCoy,et al.  Dialing Back Abuse on Phone Verified Accounts , 2014, CCS.

[37]  Le Zhang,et al.  SybilSCAR: Sybil detection in online social networks via local rule based propagation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[38]  Urs Hengartner,et al.  Proving your location without giving up your privacy , 2010, HotMobile '10.

[39]  Jinyuan Jia,et al.  Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[40]  Stephan Huber,et al.  Calculate Travel Time and Distance with Openstreetmap Data Using the Open Source Routing Machine (OSRM) , 2016 .

[41]  Xin Liu,et al.  Exploring social properties in vehicular ad hoc networks , 2012, Internetware.

[42]  Chris Kanich,et al.  Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.

[43]  Thrasyvoulos Spyropoulos,et al.  Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing , 2010, 2010 Proceedings IEEE INFOCOM.

[44]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[45]  Satyajayant Misra,et al.  SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[46]  Jan Magne Tjensvold Comparison of the IEEE 802.11, 802.15.1, 802.15.4 and 802.15.6 wireless standards , 2007 .