Mitigation of Location Based Attacks for Increased User Privacy

Year : 2023 | Volume : 01 | Issue : 02 | Page : 1-5
By

    Manas Kumar Yogi

  1. Assistant Professor, Department computer science & Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India

Abstract

Designing an effective method to mitigate location-based attacks is a pressing imperative in the realm of cybersecurity. As our world becomes increasingly interconnected through the Internet of Things (IoT) and location-aware services, the risks associated with the misuse of location data continue to escalate. Location-based attacks encompass a spectrum of threats, from geolocation spoofing and eavesdropping to geo-tagging abuse, potentially leading to severe privacy invasions and security breaches. This abstract provides a comprehensive overview of the significance, challenges, and key considerations in the development of a method to combat these evolving threats. Addressing location-based attacks cannot be approached with a uniform, one-size-fits-all solution. It necessitates a multifaceted approach, integrating technical innovations and human awareness. Such a method must encompass risk assessment, evaluating potential vulnerabilities, and the effectiveness of defense mechanisms. Balancing the budget and adhering to implementation time frames are equally crucial considerations. A hybrid approach combining technical defenses like secure transmission of location data, geolocation spoofing detection, and human vigilance is vital. Users need to exercise caution when sharing locationtagged content and remain informed about the potential risks associated with location data disclosure. As the digital landscape evolves, there is no guarantee of absolute security; however, by fostering a culture of security, prioritizing risk assessment, and efficient resource allocation, organizations and individuals can navigate the intricate challenges of our interconnected world with confidence. The path to comprehensive security lies in the unity of innovation, vigilance, and resource management, guiding us toward a safer and more secure digital future.

Keywords: Privacy, Security, Attacks, Authentication, geolocation spoofing detection, hybrid mechanism, geographical, location-based attacks

[This article belongs to International Journal of Mobile Computing Technology(ijmct)]

How to cite this article: Manas Kumar Yogi Mitigation of Location Based Attacks for Increased User Privacy ijmct 2023; 01:1-5
How to cite this URL: Manas Kumar Yogi Mitigation of Location Based Attacks for Increased User Privacy ijmct 2023 {cited 2023 Dec 13};01:1-5. Available from: https://journals.stmjournals.com/ijmct/article=2023/view=0

var fieldValue = “[user_role]”;
if (fieldValue == ‘indexingbodies’) {
document.write(‘Full Text PDF‘);
}
else if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }
else if (fieldValue == ‘ijmct’) { document.write(‘Full Text PDF‘); }
else { document.write(‘ ‘); }

References

Ahmed N, Deng Z, Memon I, Hassan F, Mohammadani KH, Iqbal R. A survey on location privacy attacks and prevention deployed with IoT in vehicular networks. Wireless Communications and Mobile Computing. 2022 Apr 26;2022.
Asghar MR, Hu Q, Zeadally S. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks. 2019 Dec 24;165:106946.
Bashanfar A, Al-Zahrani E, Alutebei M, Aljagthami W, Alshehri S. A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing. International Journal of Advanced Computer Science and Applications. 2019;10(7).
Ahmed HI, Nasr AA, Abdel-Mageid S, Aslan HK. A survey of IoT security threats and defenses. International Journal of Advanced Computer Research. 2019 Oct;9(45):325-50.
Shiu YS, Chang SY, Wu HC, Huang SC, Chen HH. Physical layer security in wireless networks: A tutorial. IEEE wireless Communications. 2011 Apr 15;18(2):66-74.
Emmanuel M, Rayudu R. Communication technologies for smart grid applications: A survey. Journal of Network and Computer Applications. 2016 Oct 1;74:133-48.
Li J, Feng Z, Feng Z, Zhang P. A survey of security issues in cognitive radio networks. China Communications. 2015 Mar;12(3):132-50.
Cui L, Yu FR, Yan Q. When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE network. 2016 Jan 25;30(1):58-65.
Jing X, Yan Z, Pedrycz W. Security data collection and data analytics in the internet: A survey. IEEE Communications Surveys & Tutorials. 2018 Aug 7;21(1):586-618.


Regular Issue Subscription Review Article
Volume 01
Issue 02
Received October 29, 2023
Accepted November 7, 2023
Published December 13, 2023

function myFunction2() {
var x = document.getElementById(“browsefigure”);
if (x.style.display === “block”) {
x.style.display = “none”;
}
else { x.style.display = “Block”; }
}
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
changeSlides(-1);
});
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
changeSlides(1);
});
var slideIndex = 1;
showSlides(slideIndex);
function changeSlides(n) {
showSlides((slideIndex += n));
}
function currentSlide(n) {
showSlides((slideIndex = n));
}
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n (item.style.display = “none”));
Array.from(dots).forEach(
item => (item.className = item.className.replace(” selected”, “”))
);
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;
}