You're where? prove it!: towards trusted indoor location estimation of mobile devices

Location-enabled applications now permeate the mobile computing landscape. As technologies like Bluetooth Low Energy (BLE) and Apple's iBeacon protocols begin to see widespread adoption, we will no doubt see a proliferation of indoor location enabled application experiences. While not essential to each of these applications, many will require that the location of the device be true and verifiable. In this paper, we present LocAssure, a new framework for trusted indoor location estimation. The system leverages existing technologies like BLE and iBeacons, making the solution practical and compatible with technologies that are already in use today. In this work, we describe our system, situate it within a broad location assurance taxonomy, describe the protocols that enable trusted localization in our system, and provide an analysis of early deployment and use characteristics. Through developer APIs, LocAssure can provide critical security support for a broad range of indoor location applications.

[1]  Mario Fernando Montenegro Campos,et al.  Fingerprinting-based radio localization in indoor environments using multiple wireless technologies , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[2]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[3]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[4]  Philipp Bolliger,et al.  Redpin - adaptive, zero-configuration indoor localization through user collaboration , 2008, MELT '08.

[5]  Urs Hengartner,et al.  Proving your location without giving up your privacy , 2010, HotMobile '10.

[6]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[7]  Hao Tang,et al.  HiFi: hide and find digital content associated with physical objects via coded light , 2014, HotMobile.

[8]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[9]  Tim Moors,et al.  Using short-range communication to control mobile device functionality , 2006, Personal and Ubiquitous Computing.

[10]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.

[11]  Guobin Shen,et al.  Experiencing and handling the diversity in data density and environmental locality in an indoor positioning service , 2014, MobiCom.

[12]  Ana M. Bernardos,et al.  A fusion method based on bluetooth and WLAN technologies for indoor location , 2008, 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems.

[13]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[15]  Radu Sion,et al.  The Shy Mayor: Private Badges in GeoSocial Networks , 2012, ACNS.

[16]  A. Harter,et al.  The Anatomy of a ContextAware Application , 1999, MobiCom 1999.

[17]  Evangelos P. Markatos,et al.  The man who was there: validating check-ins in location-based services , 2013, ACSAC.

[18]  Matthew Cooper,et al.  LoCo: a ready-to-deploy framework for efficient room localization using Wi-Fi , 2014, UbiComp.

[19]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .

[20]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 2002, Wirel. Networks.

[21]  Ahmad-Reza Sadeghi,et al.  I Know Where You are: Proofs of Presence Resilient to Malicious Provers , 2015, AsiaCCS.

[22]  Chien-Chung Shen,et al.  Loc-Auth: Location-enabled authentication through attribute-based encryption , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).