Preserving location privacy in wireless lans
- 13 June 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 246-257
- https://doi.org/10.1145/1247660.1247689
Abstract
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals. Location is private information and can be used by malicious individuals for blackmail, stalking, and other privacy violations. In this paper, we analyze the problem of location privacy in wireless networks and present a protocol for improving location privacy. Our basic approach is to obfuscate several types of privacy-compromising information revealed by a mobile node, including sender identity, time of transmission, and signal strength. Our design is driven by real-system implementation and field experiments along with analysis and simulations. Our system allows users to choose the level of privacy they desire, thereby increasing the performance of less private users (while not sacrificing private users' privacy at the same time). We evaluated our system based on real-life mobility data and wireless LAN coverage. Our results show that a user of our system can be indistinguishable from a thousand users in the same coverage area.Keywords
This publication has 10 references indexed in Scilit:
- Accuracy characterization for metropolitan-scale Wi-Fi localizationPublished by Association for Computing Machinery (ACM) ,2005
- The quest for personal control over mobile location privacyIEEE Communications Magazine, 2004
- Enhancing location privacy in wireless LAN through disposable interface identifiersPublished by Association for Computing Machinery (ACM) ,2003
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- RADAR: an in-building RF-based user location and tracking systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Robotics-based location sensing using wireless ethernetPublished by Association for Computing Machinery (ACM) ,2002
- CrowdsACM Transactions on Information and System Security, 1998
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948