Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis 2014
DOI: 10.1145/2675682.2676400
|View full text |Cite
|
Sign up to set email alerts
|

A spatial entropy-based approach to improve mobile risk-based authentication

Abstract: The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the concept of Shannon's information theory, we introduce a variant version of spatial entropy vectors embedded with time information as a mathematical modeling tool to evaluate regular movement patterns, and spatial entropy vectors derived from user movements range and paces. To support the approach, several algorithms have been designed and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…As an extension of this concept, trajectory k-anonymity requires that each trajectory be attributable to at least k-1 others, a statistic that necessitates some calculation of route similarity or clustering (Nergiz et al, 2009). Xiong et al (2014) calculate privacy risk factors for GPS data by comparing the spatial entropy vectors of real-time mobility traces to historical distributions. In environments where GPS data may be inaccurate, a raster-based clustering method may be appropriate (Meratnia and de By, 2002).…”
Section: Related Workmentioning
confidence: 99%
“…As an extension of this concept, trajectory k-anonymity requires that each trajectory be attributable to at least k-1 others, a statistic that necessitates some calculation of route similarity or clustering (Nergiz et al, 2009). Xiong et al (2014) calculate privacy risk factors for GPS data by comparing the spatial entropy vectors of real-time mobility traces to historical distributions. In environments where GPS data may be inaccurate, a raster-based clustering method may be appropriate (Meratnia and de By, 2002).…”
Section: Related Workmentioning
confidence: 99%
“…An adversary with the following knowledge can launch an attack; Attacking model Having these pieces of information an attacker may be able to launch three types of attacks namely homogeneity attack [25], query tracking attack [9] and maximum movement boundary (MMB) attack [15].…”
Section: Security Analysismentioning
confidence: 99%
“…But if an attacker possess rectangles from the same user at different times and therefore knows the user's maximum velocity, then it is possible to infer user's approximated location from the overlap of the current rectangle and the maximum movement bound with respect to the previous rectangle, an attack referred to as maximum movement boundary attack [15].…”
Section: Maximum Movement Boundary Attackmentioning
confidence: 99%
See 2 more Smart Citations