International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-based Services

Author NameAuthor Details

Muhammad Jawad Ikram, Jonathan Cazalas

Muhammad Jawad Ikram[1]

Jonathan Cazalas[2]

[1]Department of Computer Science, King Abdul-Aziz University, Jeddah, Saudi Arabia.

[2]Department of Computer Science, King Abdul-Aziz University, Jeddah, Saudi Arabia.


The ubiquitous nature of smartphones and GPS-enabled devices, coupled with the increasingly popular usage of location-based services, has effectively created an environment where data access truly is anywhere at any time. While said environment is indeed convenient and quite useful, the unfortunate reality is that users are exposed to a variety of privacy and security threats. User location information can be tracked and then used in malicious ways by non-trusted applications and adversaries. We address this problem by proposing an efficient, collaborative technique that is integrated with an intrusion detection system and rekeying techniques. The algorithm is parameterized by defining performance and security metrics, which can then be used to find optimal settings, both in terms of privacy and quality of service. Based on the proposed performance-security metrics, the tradeoff between privacy and quality of service can be quantified.

Index Terms

Intrusion Detection System (IDS)


Location-Based Services (LBS)




  1. 1.
    Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Hiding in the Mobile Crowd: Location Privacy through Collaboration. IEEE transactions on dependable and secure computing, special issue on “security and privacy in mobile platforms”, 2014.
  2. 2.
    Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref, SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases. SIGMOD 2004, Paris, France, June 13-18, 2004.
  3. 3.
    “Pleaserobme:”, date accessed: 12-05-2014.
  4. 4.
    Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. A hybrid technique for private location-based queries with database protection. In: Mamoulis N, Seidl T, Pedersen T, Torp K, Assent I (eds) Advances in spatial and temporal databases. Lecture notes in computer science, vol 5644. Springer, Berlin/Heidelberg, 2009, pp 98–116.
  5. 5.
    Mokbel MF, Chow C-Y, Aref WG. The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases, VLDB ’06, VLDB Endowment, 2006, pp 763–774.
  6. 6.
    Jha, R.K.; Dalal, U.D., "Location based radio resource allocation (LBRRA) in WiMAX and WiMAX-WLAN interface network," in Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on , vol., no., pp.1-2, 3-7 Jan. 2012.doi: 10.1109/COMSNETS.2012.6151362.
  7. 7.
    G.Rohini , A.Srinivasan. “Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks”, International Journal of Computer Networks and Applications Volume 2, Issue 2, March – April 2015.
  8. 8.
    Suresh Limkar, Rakesh Kumar Jha, “Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (INDIA 2012) held in Visakhapatnam, India, January 2012, Volume 132 of the series Advances in Intelligent and Soft Computing pp 943-950.
  9. 9.
    William J. Buchanan • Zbigniew Kwecka • Elias Ekonomou, A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services. Mobile Netw Appl, , 2013, 18:728–737.
  10. 10.
    J. Meyerowitz and R. Roy Choudhury, “Hiding stars with fireworks: location privacy through camouflage,” in MobiCom’09: Proceedings of the 15th annual international conference on Mobile computing and networking, 2009.
  11. 11.
    F. Olumofin, P. K. Tysowski, I. Goldberg, and U. Hengartner, “Achieving efficient query privacy for location based services,” in Privacy Enhancement Technologies (PETS), 2010.
  12. 12.
    G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L.Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD inter-national conference on Management of data, 2008.
  13. 13.
    Chow C-Y, Mokbel M. Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 1, 2009, 23–27.
  14. 14.
    Truong A, Truong Q, Dang T. An adaptive gridbased approach to location privacy preservation. In: Nguyen N, Katarzyniak R, Chen S-M (eds) Advances in intelligent information and database systems. Studies in computational intelligence, vol 283. Springer, Berlin/Heidelberg, , 2010, pp 133–144.
  15. 15.
    Dewri R, Ray I, Whitley D. Query m-invariance: Preventing query disclosures in continuous location-based services. In: Eleventh international conference on mobile data management (MDM), 2010, pp 95–104.
  16. 16.
    Damiani ML, Bertino E, Silvestri C. The probe framework for the personalized cloaking of private locations. Trans Data Privacy, 2010, 3:123–148.
  17. 17.
    Ghinita G, Damiani ML, Silvestri C, Bertino E. Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems, GIS ’09. ACM, New York, NY, USA, 2009, pp 246–255.
  18. 18.
    Pingley A, Yu W, Zhang N, Fu X, Zhao W. Cap: A context-aware privacy protection system for location-based services. In: ICDCS ’09. 29th IEEE international conference on distributed computing systems, 2009. pp 49–57.
  19. 19.
    Gkoulalas-Divanis A, Verykios VS, Bozanis P. A network aware privacy model for online requests in trajectory data. Data Knowl Eng, 2009, 68(4):431–452.
  20. 20.
    Chow C-Y, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual ACM international symposium on advances in geographic information systems,GIS ’06. ACM, New York, NY, USA, 2006, pp 171–178.
  21. 21.
    Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K. A distributed privacy-preserving scheme for location-based queries. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), 2010, pp 1–6.
  22. 22.
    Sun Y, La Porta TF, Kermani P. A flexible privacy enhanced location-based services system framework and practice. IEEE Trans Mob Comput 8(3): 2009, pp304 –321.
  23. 23.
    Gruteser M, Grunwald D. A methodological assessment of location privacy risks in wireless hotspot networks. In: Security in pervasive computing, volume 2802 of lecture notes in computer science. Springer, Berlin/Heidelberg, 2004, pp 113–142.
  24. 24.
    Huang, Y. and Lee, W., “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proc. 1st ACM Workshop on Security of Ad-hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135-147.
  25. 25.
    Hui Cheng, Jiannong Cao, Hsiao-Hwa Chen, Hongke Zhang, GrLS: Group-based Location Service in Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, Volume: 57, Issue: 6, Page(s): 3693-3707, 2008.
  26. 26.
    Y. Yan, Qian, Y., and Sharif, H., “A secure and reliable In-Network Collaborative Communication Scheme for Advanced Metering Infrastructure in Smart Grid”, in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, 2011.
  27. 27.
    Gärtner, F. C., “Byzantine Failures and Security: Arbitrary is not (always) Random,” Technical Report IC/2003/20, EPFL, April, 2003.
  28. 28.
    Cho, J.-H., Chen, I.-R. and Feng, P.-G. “Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobilead hoc networks.” AINAW '08: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, Washington, DC, USA, 2008, pp. 644-649.
  29. 29.
    Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)" (PDF). Computer Security Resource Center (National Institute of Standards and Technology) (800–94). Retrieved 1 January 2010.
  30. 30.
    Ravi Shankar P, Santosh Naidu P. “A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis”, International Journal of Computer Networks and Applications Volume 1, Issue 1, November – December, 2014.
  31. 31.
    Brutch, P., and Ko , C., “Challenges in Intrusion Detection for Wireless Ad-hoc Networks,” Proc. Symposium on Applications and the Internet Workshops, 27-31 Jan. 2003, pp.178 – 373.
  32. 32.
    Cho, J.H., Chen, I. R., and Eltoweissy, M., “On Optimal Batch Rekeying for Secure Group Communications in Wireless Networks,” ACM/Springer Wireless Networks, 2007.
  33. 33.
    Patrick P.C. Lee, John C.S. Lui, and David K.Y. Yau, “Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups,” IEEE/ACM Transactions on Networking, vol. 14, no. 2, April 2006, pp.263-276.
  34. 34.
    Li, X., Yang, Y.R., Gouda, M. G. and Lam, S.S. “Batch Rekeying for Secure Group Communications,” Proc. of the Tenth Int’l Conf. on World Wide Web, Hong Kong, July 2001, pp. 525-534.
  35. 35.
    Bianchi, G., “Performance Analysis of the IEEE 802.11Distributed Coordination Function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, Mar. 2000, pp. 535-547.