skip to main content
10.1145/1161289.1161292acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Location privacy in wireless personal area networks

Published:28 September 2006Publication History

ABSTRACT

Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the place and time of the communication between the mobile devices. The hardware address of the device can often be linked to the identity of the user operating the mobile device; this represents a violation of the user's privacy. Fortunately, this problem can be solved quite efficiently in a WPAN. We consider four communication scenarios and present several techniques to solve the location privacy problem in each of these scenarios. As mobile devices in a WPAN are typically operated by a user and energy constrained, we focused on user-friendliness and energy consumption during the design of our solutions.

References

  1. D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to Strangers: Authentication in Adhoc Wireless Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.]]Google ScholarGoogle Scholar
  2. Bluetags Corporation. http://www.bluetags.com.]]Google ScholarGoogle Scholar
  3. Bluetooth Special Interest Group. http://www.bluetooth.com/.]]Google ScholarGoogle Scholar
  4. Bluetooth Specification. https://www.bluetooth.org/spec/.]]Google ScholarGoogle Scholar
  5. H. Cheung. The Bluesniper Rifle, 2004. http://www.tomsnetworking.com/Sections-article106.php.]]Google ScholarGoogle Scholar
  6. DEF CON. Computer Underground Hackers Convention. http://www.defcon.org.]]Google ScholarGoogle Scholar
  7. W. Diffie and M. Hellman. New Directions in Cryptography. In IEEE Transactions on Information Theory, pages 644--654, 1976.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH '03), pages 46--55. ACM Press, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38--45, 1998.]]Google ScholarGoogle Scholar
  10. J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212--226. Springer-Verlag, 2004.]]Google ScholarGoogle Scholar
  11. J. H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 05), Lecture Notes in Computer Science, LNCS 3450, pages 101--116. Springer-Verlag, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. IEEE 802.15, the Wireless Personal Area Network Working Group. http://www.ieee802.org/15/.]]Google ScholarGoogle Scholar
  13. Infrared Data Association. http://www.irda.org/.]]Google ScholarGoogle Scholar
  14. M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176--191. Springer-Verlag, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Loca Project. http://www.loca-lab.org.]]Google ScholarGoogle Scholar
  16. A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184--199. Springer-Verlag, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, July 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, October 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org.]]Google ScholarGoogle Scholar
  20. N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30--35. ACM Press, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47--53. Springer-Verlag, 1984.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Singelée and B. Preneel. Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06).]]Google ScholarGoogle Scholar
  23. D. Singelée and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45--53, 2006.]]Google ScholarGoogle Scholar
  24. F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172--182. Springer-Verlag, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. The WI-FI alliance. http://www.wi-fi.org/.]]Google ScholarGoogle Scholar
  26. F. Wong and F. Stajano. Location Privacy in Bluetooth. In Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS '05), Lecture Notes in Computer Science, LNCS 3813, pages 176--188. Springer-Verlag, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Location privacy in wireless personal area networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSe '06: Proceedings of the 5th ACM workshop on Wireless security
      September 2006
      115 pages
      ISBN:1595935576
      DOI:10.1145/1161289

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate10of41submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader