ABSTRACT
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the place and time of the communication between the mobile devices. The hardware address of the device can often be linked to the identity of the user operating the mobile device; this represents a violation of the user's privacy. Fortunately, this problem can be solved quite efficiently in a WPAN. We consider four communication scenarios and present several techniques to solve the location privacy problem in each of these scenarios. As mobile devices in a WPAN are typically operated by a user and energy constrained, we focused on user-friendliness and energy consumption during the design of our solutions.
- D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to Strangers: Authentication in Adhoc Wireless Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.]]Google Scholar
- Bluetags Corporation. http://www.bluetags.com.]]Google Scholar
- Bluetooth Special Interest Group. http://www.bluetooth.com/.]]Google Scholar
- Bluetooth Specification. https://www.bluetooth.org/spec/.]]Google Scholar
- H. Cheung. The Bluesniper Rifle, 2004. http://www.tomsnetworking.com/Sections-article106.php.]]Google Scholar
- DEF CON. Computer Underground Hackers Convention. http://www.defcon.org.]]Google Scholar
- W. Diffie and M. Hellman. New Directions in Cryptography. In IEEE Transactions on Information Theory, pages 644--654, 1976.]]Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH '03), pages 46--55. ACM Press, 2003.]] Google ScholarDigital Library
- J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38--45, 1998.]]Google Scholar
- J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212--226. Springer-Verlag, 2004.]]Google Scholar
- J. H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 05), Lecture Notes in Computer Science, LNCS 3450, pages 101--116. Springer-Verlag, 2005.]] Google ScholarDigital Library
- IEEE 802.15, the Wireless Personal Area Network Working Group. http://www.ieee802.org/15/.]]Google Scholar
- Infrared Data Association. http://www.irda.org/.]]Google Scholar
- M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176--191. Springer-Verlag, 2001.]] Google ScholarDigital Library
- Loca Project. http://www.loca-lab.org.]]Google Scholar
- A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184--199. Springer-Verlag, 1999.]] Google ScholarDigital Library
- A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, July 1993.]] Google ScholarDigital Library
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, October 1996.]] Google ScholarDigital Library
- New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org.]]Google Scholar
- N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30--35. ACM Press, 2003.]] Google ScholarDigital Library
- A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47--53. Springer-Verlag, 1984.]] Google ScholarDigital Library
- D. Singelée and B. Preneel. Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06).]]Google Scholar
- D. Singelée and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45--53, 2006.]]Google Scholar
- F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172--182. Springer-Verlag, 1999.]] Google ScholarDigital Library
- The WI-FI alliance. http://www.wi-fi.org/.]]Google Scholar
- F. Wong and F. Stajano. Location Privacy in Bluetooth. In Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS '05), Lecture Notes in Computer Science, LNCS 3813, pages 176--188. Springer-Verlag, 2005.]] Google ScholarDigital Library
Index Terms
- Location privacy in wireless personal area networks
Recommendations
Protecting Location Privacy via Synchronously Pseudonym Changing in VANETs
CSNT '14: Proceedings of the 2014 Fourth International Conference on Communication Systems and Network TechnologiesLocation privacy is an important concern in VANETS. Anonymity is one of commonly adopted solution to protect location privacy. In this paper, we present a mechanism based on an ID-based cryptosystem in order to ensure vehicles' anonymity by pseudonyms. ...
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Resilient Privacy Protection for Location-Based Services through Decentralization
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS ...
Comments