skip to main content
10.1145/1179601.1179605acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Swing & swap: user-centric approaches towards maximizing location privacy

Published:30 October 2006Publication History

ABSTRACT

In wireless networks, the location tracking of devices and vehicles (nodes) based on their identifiable and locatable broadcasts, presents potential threats to the location privacy of their users. While the tracking of nodes can be mitigated to an extent by updating their identifiers to decorrelate their traversed locations, such an approach is still vulnerable to tracking methods that utilize the predictability of node movement to limit the location privacy provided by the identifier updates. On the other hand, since each user may need privacy at different locations and times, a user-centric approach is needed to enable the nodes to independently determine where/when to update their identifiers. However, mitigation of tracking with a user-centric approach is difficult due to the lack of synchronization between updating nodes. This paper addresses the challenges to providing location privacy by identifier updates due to the predictability of node locations and the asynchronous updates, and proposes a user-centric scheme called Swing that increases location privacy by enabling the nodes to loosely synchronize updates when changing their velocity. Further, since each identifier update inherently trades off network service for privacy, the paper also introduces an approach called Swap, which is an extension of Swing, that enables the nodes to exchange their identifiers to potentially maximize the location privacy provided by each update, hence reducing the number of updates needed to meet the desired privacy levels. The performance of the proposed schemes is evaluated under random and restricted pedestrian mobility.

References

  1. 5.9GHz DSRC. http://grouper.ieee.org/groups/scc32/dsrc/.Google ScholarGoogle Scholar
  2. P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proc. of INFOCOM, pages 775--784, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  3. F. Bai, N. Sadagopan, and A. Helmy. IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. In Proc. of IEEE INFOCOM, pages 825--835, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. R. Beresford. Location Privacy in Ubiquitous Computing. PhD thesis, University of Cambridge, 2004.Google ScholarGoogle Scholar
  5. A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Bettstetter, G. Resta, and P. Santi. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. on Mobile Computing, 2(3):257--269, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--88, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65--75, 1988. Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Chen, S. Chan, and S. Liew. Mixed-modeWLAN: the integration of ad hoc mode with wireless LAN infrastructure. In Proc. of IEEE Globecom, pages 231--235, 2003.Google ScholarGoogle Scholar
  10. T. M. Cover and J. A. Thomas. Elements of Information Theory. JohnWiley & Sons, Inc., 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Dötzer. Privacy issues in vehicular ad hoc networks. In Proc. of PET, pages 197--209, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of ACM MobiSys, pages 31--42, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. . Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In Proc. of ACM WMASH, pages 46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Q. He, D. Wu, and P. Khosla. The quest for personal control over mobile location privacy. IEEE Communications Magazine, 42(5):130--136, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Hoh and M. Gruteser. Location privacy through path confusion. In Proc. of IEEE SecureComm, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Towards modeling wireless location privacy. In Proc. of Privacy Enhancing Technologies (PET), pages 59--77, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Silent cascade: Enhancing location privacy without communication qos degradation. In Proc. of Security in Pervasive Computing (SPC), pages 165--180, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Leenes and B.-J. Koops. 'Code' and privacy - or how technology is slowly eroding privacy. In Essays on the normative role of information technology. T.M.C. Asser Press, The Hague, Netherlands, 2005.Google ScholarGoogle Scholar
  19. H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 17:101--139, 2004.Google ScholarGoogle Scholar
  20. T. S. Rappaport, J. H. Reed, and B. D.Woerner. Position location using wireless communications on highways of the future. IEEE Communications Magazine, 10(1):33--41, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Raya and J.-P. Hubaux. The security of vehicular ad hoc neworks. Proc. of ACM SASN, pages 11--21, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Tech. Report SRI-CSL-98-04, CS Lab, SRI International, 1998.Google ScholarGoogle Scholar
  23. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for VANET. In Proc. of Embedded Security in Cars (ESCAR), 2005.Google ScholarGoogle Scholar
  24. A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Proc. of Privacy Enhancing Technologies (PET), pages 41--53, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In Proc. of Information Hiding Workshop, pages 36--52, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. IEEE 802.11WG. http://grouper.ieee.org/groups/802/11/.Google ScholarGoogle Scholar
  27. X. Yang. IEEE 802.11e: Qos provisioning at the MAC layer. IEEE Wireless Communications, 11(3):72--79, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Yoon, M. Liu, and B. Noble. Random waypoint consideredGoogle ScholarGoogle Scholar

Index Terms

  1. Swing & swap: user-centric approaches towards maximizing location privacy

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society
      October 2006
      128 pages
      ISBN:1595935568
      DOI:10.1145/1179601

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 October 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate106of355submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader