Sybil Attack on Crowd Soured Mobile Mapping Services

Authors

  • P. C. Zambare  Computer Engineering Department, NESGI, Pune, Maharashtra, India
  • Pornima Avaghade  Computer Engineering Department, NESGI, Pune, Maharashtra, India
  • Rohini Salunkhe  Computer Engineering Department, NESGI, Pune, Maharashtra, India
  • Ankita Shinde  Computer Engineering Department, NESGI, Pune, Maharashtra, India
  • Pooja Pilane  Computer Engineering Department, NESGI, Pune, Maharashtra, India

Keywords:

Online social networks, crowdsourcing, Sybil attack, location privacy, Mobile mapping, Mobile Computing, Spatial data collection, Web technologies

Abstract

Banks are giving flexible mobile applications to their client which is reliable, verified and secured however complex and vulnerable to a network problem. The problem in the current banking application is the unauthorized user can gain access to genuine user’s accounts and perform unauthorized transactions. So as compared to the current banking application which is location free, we are developing a banking application utilizing location-based encryption which will be location dependent. User can easily perform transaction only if he/she is within TD (Toleration Distance) region. TD region is area of Toleration Distance (TD) where the users can perform the transaction. If the user goes out of TD region then the transaction will terminate automatically. We are also providing extra security by OTP and secret key.

References

  1. C Ngo, Y Demchencko, and C de Laat, "Multi-tenant attribute-based access control for cloud infrastructure services," Journal of Information Security and Applications, 2015.
  2. J Brassil, P K Manadhata, and R Netravali, "Traffic signature-based mobile device location authentication," IEEE Transactions on Mobile Computing, , vol. 13, no. 9, pp. 2156-2169, 2014.
  3. Olayemi M. Olaniyi, Folorunso A. Taliha , Aliyu Ahmed, and Olugbenga Joseph, "Design of Secure Electronic Voting System Using Fingerprint Biometrics and CryptoWatermarking Approach," International Journal of Information Engineering and Electronic Business(IJIEEB), pp. 9-17, September 2016.
  4. Roselin Chirchi Vanaja and Laxman. M Waghmare, "Iris Biometric Authentication used for Security Systems," Iinternational Journal of Image, Graphics and Signal Processing, pp. 54-60, August 2014.
  5. F. Roos, M. Sadeghi, J. Bechter, N. Appenrodt, J. Dickmann, and C. Waldschmidt, “Ghost Target Identification by Analysis of the Doppler Distribution in Automotive Scenarios,” 18th International Radar Symposium, Prague, Czech Republic, Jun. 2017.
  6. R. Prophet, J. Martinez, J. C. Fuentes, R. Ebelt and M.Vossiek, “Instantaneous Ghost Detection Identification in Automotive Scenarios”, submitted to IEEE Radar Conference, Boston, MA, USA, Apr. 2019.
  7. L.C. Chen, G. Papandreou, F. Schroff and H. Adam, “Rethinking Atrous Convolution for Semantic Image Segmentation,” arXiv 1706.05587, 2017.
  8. M. Oquab, L. Bottou, I. Laptev and J. Sivic, “Is object localization for free? - Weakly-supervised learning with convolutional neural networks,” 2015 IEEE Conf. on Computer Vision and Pattern Recognition, Boston, MA, USA, 2015, pp. 685-694.
  9. J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks forsemantic segmentation,” CVPR, pp. 3431-3440, 2015.
  10. J. Martinez and M. Vossiek “Deep Learning-Based Segmentation for the Extraction of Micro-Doppler Signatures,” in procc. of the European Microwave Week (EuRAD), Madrid, Spain, Sept. 2018.
  11. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” Int. Conf. on Learning Representations, pp. 1-13, 2015.
  12. B. Wang, L. Zhang, and N. Z. Gong, “SybilSCAR: Sybil detection in online social networks via local rule based propagation,” in Proc. INFOCOM, 2017.

Downloads

Published

2021-08-30

Issue

Section

Research Articles

How to Cite

[1]
P. C. Zambare, Pornima Avaghade, Rohini Salunkhe, Ankita Shinde, Pooja Pilane, " Sybil Attack on Crowd Soured Mobile Mapping Services, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 4, pp.129-137, July-August-2021.