Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study
- Authors
- Cho, J[Cho, Junsung]; Yu, J[Yu, Jaegwan]; Oh, S[Oh, Sanghak]; Ryoo, J[Ryoo, Jungwoo]; Song, J[Song, JaeSeung]; Kim, H[Kim, Hyoungshick]
- Issue Date
- Mar-2017
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Citation
- IEEE COMMUNICATIONS MAGAZINE, v.55, no.3, pp.132 - 137
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE COMMUNICATIONS MAGAZINE
- Volume
- 55
- Number
- 3
- Start Page
- 132
- End Page
- 137
- URI
- https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/29921
- DOI
- 10.1109/MCOM.2017.1600595CM
- ISSN
- 0163-6804
- Abstract
- The Internet of Things interconnects a mass of billions devices, from smartphones to cars, to provide convenient services to people. This gives immediate access to various data about the objects and the environmental context - leading to smart services and increased efficiency. A number of retail stores have started to adopt IoT enabled services to attract customers. In particular, thanks to indoor proximity technologies, it is possible to introduce location-based smart services to customers, for example, transmitting identifiable signals that represent the locations of stores. In this article, we investigate a potential security risk involved in such technologies: physical signals used as identifiers can be captured and forged easily with today's widely available IoT software for implementing location spoofing attacks. We highlight this security risk by providing a case study: an in-depth security analysis of the recently launched Starbucks service called Siren Order.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Computing and Informatics > Computer Science and Engineering > 1. Journal Articles
- Information and Communication Engineering > Department of Software > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.