Location Security and Privacy: An LTE Based Approach

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Integrity of location data from smart-phones is essential in several location-dependent applications. Unfortunately it is quite easy to spoof location data on smart phones. Therefore, most mission critical services such as road-side assistance, use location aggregators to supply verified location with user permission. This verified location is purchased from cellular carriers and user permission is required to comply with governmental privacy laws. However, cellular carriers, not aggregators are bound by privacy regulation. Therefore, when there is a breach of confidentiality, as it happened recently in the US, it is the cellular carriers' who were held responsible and must take corrective actions. In this paper, we present a mechanism to obtain location certificates using LTE positioning protocols so that it is possible for cellular carriers to (a) obtain verifiable consent from the mobile user before their location is released, (b) be able to directly provide verified location as a service to businesses rather than selling customer data to third party location aggregators, and (c) enable mobile users to store self-certifiable proofs of their own location to reuse as needed. With this mechanism in place, people can have greater control over their privacy as location-dependent services are assured of integrity.

Author supplied keywords

Cite

CITATION STYLE

APA

Jain, S., & Samanta, P. (2020). Location Security and Privacy: An LTE Based Approach. In MobiWac 2020 - Proceedings of the 18th ACM Symposium on Mobility Management and Wireless Access (pp. 115–124). Association for Computing Machinery, Inc. https://doi.org/10.1145/3416012.3424626

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free