Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement

Anum Arshad, Haider Abbas, Waleed Bin Shahid, Anique Azhar

Research output: Contribution to conferencePaperpeer-review

Abstract

Location-based services have exponentially escalated in the past few decades. They appear to be very practical, however, the location of user is constantly being tracked, hoarded, and monitored by tech giants without user knowledge and consent. Google keeps an eye on every motion of its users, irrespective of their security settings. For this study, various Android smartphones were carried through different places for one week without the availability of internet and location services. Later, thorough network traffic analysis revealed that the archived data collected by Google apps and services, contained location data as well. This data is transferred to Google as soon as the internet connection becomes available. Moreover, a detailed performance analysis of existing fake GPS location applications was conducted that revealed a plethora of weaknesses in their performance and none of them aimed to secure users' real location coordinates. In this paper, we present an interesting solution to obfuscate Android users' real location coordinates, even in off-line mode, thereby, guaranteeing location privacy.
Original languageEnglish
Pages107-112
DOIs
Publication statusPublished - 1 Feb 2021
Externally publishedYes
EventIEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) - Bayonne, France
Duration: 10 Sept 202013 Sept 2020
Conference number: 29
https://ieeexplore.ieee.org/xpl/conhome/9338448/proceeding

Conference

ConferenceIEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Country/TerritoryFrance
CityBayonne
Period10/09/2013/09/20
Internet address

Keywords

  • Google Tracking
  • Android Location Spoofing
  • Information Leakage
  • GPS Spoofing
  • Cyber-Espionage

Cite this