Mitigation of Location-based Attacks for Increased User Privacy

Year : 2024 | Volume :01 | Issue : 02 | Page : 1-5
By

    Manas Kumar Yogi

  1. Assistant Professor, Department computer science & Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India

Abstract

Designing an effective method to mitigate location-based attacks is a pressing imperative in the realm of cybersecurity. As our world becomes increasingly interconnected through the Internet of Things and location-aware services, the risks associated with the misuse of location data continue to escalate. Location-based attacks encompass a spectrum of threats, from geolocation spoofing and eavesdropping to geo-tagging abuse, potentially leading to severe privacy invasions and security breaches. This abstract provides a comprehensive overview of the significance, challenges, and key considerations in the development of a method to combat these evolving threats. Addressing location-based attacks cannot be approached with a uniform, one-size-fits-all solution. It necessitates a multifaceted approach, integrating technical innovations and human awareness. Such a method must encompass risk assessment, evaluating potential vulnerabilities, and the effectiveness of defense mechanisms. Balancing the budget and adhering to implementation time frames are equally crucial considerations. A hybrid approach combining technical defenses like secure transmission of location data, geolocation spoofing detection, and human vigilance is vital. Users need to exercise caution when sharing location-tagged content and remain informed about the potential risks associated with location data disclosure. As the digital landscape evolves, there is no guarantee of absolute security; however, by fostering a culture of security, prioritizing risk assessment, and efficient resource allocation, organizations and individuals can navigate the intricate challenges of our interconnected world with confidence. The path to comprehensive security lies in the unity of innovation, vigilance, and resource management, guiding us toward a safer and more secure digital future.

Keywords: Privacy, security, attacks, authentication, geolocation spoofing detection, hybrid mechanism, geographical, location-based attacks

[This article belongs to International Journal of Mobile Computing Technology(ijmct)]

How to cite this article: Manas Kumar Yogi.Mitigation of Location-based Attacks for Increased User Privacy.International Journal of Mobile Computing Technology.2024; 01(02):1-5.
How to cite this URL: Manas Kumar Yogi , Mitigation of Location-based Attacks for Increased User Privacy ijmct 2024 {cited 2024 Jan 06};01:1-5. Available from: https://journals.stmjournals.com/ijmct/article=2024/view=130660


References

Ahmed N, Deng Z, Memon I, Hassan F, Mohammadani KH, Iqbal R. A survey on location privacy attacks and prevention deployed with IoT in vehicular networks. Wirel Commun Mob Comput. 2022; 2022: 1–15. doi: 10.1155/2022/6503299.
Asghar MR, Hu Q, Zeadally S. Cybersecurity in industrial control systems: issues, technologies, and challenges. Comput Netw. 2019; 165: 106946. doi: 10.1016/j.comnet.2019.106946.
Bashanfar A, Al-Zahrani E, Alutebei M, Aljagthami W, Alshehri S. A survey on location privacy-preserving mechanisms in mobile crowdsourcing. Int J Adv Comput Sci Appl. 2019; 10 (7). doi: 10.14569/IJACSA.2019.0100782.
Ahmed HI, Nasr AA, Abdel-Mageid S, Aslan HK. A survey of IoT security threats and defenses. Int J Adv Comput Res. 2019; 9 (45): 325–350. doi: 10.19101/IJACR.2019.940088.
Shiu YS, Chang SY, Wu HC, Huang SC, Chen HH. Physical layer security in wireless networks: A tutorial. IEEE Wirel Commun. 2011; 18 (2): 66–74. doi: 10.1109/MWC.2011.5751298.
Emmanuel M, Rayudu R. Communication technologies for smart grid applications: A survey. J Netw Comput Appl. 2016; 74: 133–148. doi: 10.1016/j.jnca.2016.08.012.
Li J, Feng Z, Feng Z, Zhang P. A survey of security issues in cognitive radio networks. China Commun. 2015; 12 (3): 132–150. doi: 10.1109/CC.2015.7084371.
Cui L, Yu FR, Yan Q. When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Netw. 2016; 30 (1): 58–65. doi: 10.1109/MNET.2016.7389832.
Jing X, Yan Z, Pedrycz W. Security data collection and data analytics in the internet: A survey. IEEE Commun Surv Tutorials. 2018; 21 (1): 586–618. doi: 10.1109/COMST.2018.2863942.


Regular Issue Subscription Review Article
Volume 01
Issue 02
Received October 29, 2023
Accepted November 7, 2023
Published January 6, 2024