A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks

نویسندگان

  • Marco Gruteser
  • Dirk Grunwald
چکیده

Mobile computing enables users to compute and communicate almost regardless of their current location. However, as a side effect this technology considerably increased surveillance potential for user movements. Current research addresses location privacy rather patchwork-like than comprehensively. Thus, this paper presents a methodology for identifying, assessing, and comparing location privacy risks in mobile computing technologies. In a case study, we apply the approach to IEEE 802.11b wireless LAN networks and location-based services, where it reveals significant location privacy concerns through linkand application-layer information. From a technological perspective, we argue that these are best addressed through novel anonymity-based mechanisms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Source Location Privacy for Energy Harvesting WSNs

Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Preserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper

While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...

متن کامل

A Survey on Achieving Source Location Privacy and Network Lifetime Maximization in Wireless Sensor Networks

In recent years, Wireless Sensor Network has drawn considerable attention from research community due to wide range of applications used. The most notable challenge which is threatening the WSN is source location privacy. Preserving the source location means hiding the physical location of the source from the adversaries and increasing difficulty for adversaries in tracing the message path back...

متن کامل

Sink Location Service Based on Fano Plane in Wireless Sensor Networks

Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003