Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1161289.1161292acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Location privacy in wireless personal area networks

Published: 28 September 2006 Publication History

Abstract

Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the place and time of the communication between the mobile devices. The hardware address of the device can often be linked to the identity of the user operating the mobile device; this represents a violation of the user's privacy. Fortunately, this problem can be solved quite efficiently in a WPAN. We consider four communication scenarios and present several techniques to solve the location privacy problem in each of these scenarios. As mobile devices in a WPAN are typically operated by a user and energy constrained, we focused on user-friendliness and energy consumption during the design of our solutions.

References

[1]
D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to Strangers: Authentication in Adhoc Wireless Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.]]
[2]
Bluetags Corporation. http://www.bluetags.com.]]
[3]
Bluetooth Special Interest Group. http://www.bluetooth.com/.]]
[4]
Bluetooth Specification. https://www.bluetooth.org/spec/.]]
[5]
H. Cheung. The Bluesniper Rifle, 2004. http://www.tomsnetworking.com/Sections-article106.php.]]
[6]
DEF CON. Computer Underground Hackers Convention. http://www.defcon.org.]]
[7]
W. Diffie and M. Hellman. New Directions in Cryptography. In IEEE Transactions on Information Theory, pages 644--654, 1976.]]
[8]
M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH '03), pages 46--55. ACM Press, 2003.]]
[9]
J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38--45, 1998.]]
[10]
J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212--226. Springer-Verlag, 2004.]]
[11]
J. H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 05), Lecture Notes in Computer Science, LNCS 3450, pages 101--116. Springer-Verlag, 2005.]]
[12]
IEEE 802.15, the Wireless Personal Area Network Working Group. http://www.ieee802.org/15/.]]
[13]
Infrared Data Association. http://www.irda.org/.]]
[14]
M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176--191. Springer-Verlag, 2001.]]
[15]
Loca Project. http://www.loca-lab.org.]]
[16]
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184--199. Springer-Verlag, 1999.]]
[17]
A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, July 1993.]]
[18]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, October 1996.]]
[19]
New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org.]]
[20]
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30--35. ACM Press, 2003.]]
[21]
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47--53. Springer-Verlag, 1984.]]
[22]
D. Singelée and B. Preneel. Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06).]]
[23]
D. Singelée and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45--53, 2006.]]
[24]
F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172--182. Springer-Verlag, 1999.]]
[25]
The WI-FI alliance. http://www.wi-fi.org/.]]
[26]
F. Wong and F. Stajano. Location Privacy in Bluetooth. In Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS '05), Lecture Notes in Computer Science, LNCS 3813, pages 176--188. Springer-Verlag, 2005.]]

Cited By

View all

Index Terms

  1. Location privacy in wireless personal area networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSe '06: Proceedings of the 5th ACM workshop on Wireless security
    September 2006
    115 pages
    ISBN:1595935576
    DOI:10.1145/1161289
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 September 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bluetooth
    2. location privacy
    3. pseudonyms

    Qualifiers

    • Article

    Conference

    DIWANS06
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Secure Linear Precoding in Overloaded MU-MIMO Wireless NetworksIEEE Transactions on Communications10.1109/TCOMM.2023.326785271:7(4050-4061)Online publication date: Jul-2023
    • (2022)SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation MeasuresEmerging Information Security and Applications10.1007/978-3-030-93956-4_7(108-127)Online publication date: 12-Jan-2022
    • (2018)Hide-n-SenseMobile Networks and Applications10.1007/s11036-013-0447-x19:3(331-344)Online publication date: 26-Dec-2018
    • (2018)Quantifying the Information Leak in IEEE 802.11 Network DiscoveryWired/Wireless Internet Communications10.1007/978-3-030-02931-9_17(207-218)Online publication date: 29-Dec-2018
    • (2017)Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case StudyJournal of Sensor and Actuator Networks10.3390/jsan60200056:2(5)Online publication date: 22-May-2017
    • (2012)Privacy in mobile technology for personal healthcareACM Computing Surveys (CSUR)10.1145/2379776.237977945:1(1-54)Online publication date: 7-Dec-2012
    • (2012)The Digital Marauder's MapIEEE Transactions on Mobile Computing10.1109/TMC.2011.7011:3(377-389)Online publication date: 1-Mar-2012
    • (2011)Adapt-liteProceedings of the 10th annual ACM workshop on Privacy in the electronic society10.1145/2046556.2046574(137-142)Online publication date: 17-Oct-2011
    • (2009)Performing traffic analysis on a wireless identifier-free link layerThe Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations10.1145/1565799.1565804(18-23)Online publication date: 1-Apr-2009
    • (2009)The Digital Marauder's MapProceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems10.1109/ICDCS.2009.57(589-596)Online publication date: 22-Jun-2009
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media