Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Vehicle-to-vehicle safety messaging in DSRC
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Identification via location-profiling in GSM networks
Proceedings of the 7th ACM workshop on Privacy in the electronic society
A survey of computational location privacy
Personal and Ubiquitous Computing
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Measuring anonymity in a non-adaptive, real-time system
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Silent cascade: enhancing location privacy without communication QoS degradation
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
A tutorial survey on vehicular ad hoc networks
IEEE Communications Magazine
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Short paper: a practical view of "mixing" identities in vehicular networks
Proceedings of the fourth ACM conference on Wireless network security
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Journal of Network and Computer Applications
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to protect the location privacy of mobile nodes suggests changing pseudonyms in regions called mix zones. In this paper, we propose a novel metric based on the mobility profiles of mobile nodes in order to evaluate the mixing effectiveness of possible mix zone locations. Then, as the location privacy achieved with mix zones depends on their placement in the network, we analyze the optimal placement of mix zones with combinatorial optimization techniques. The proposed algorithm maximizes the achieved location privacy in the system and takes into account the cost induced by mix zones to mobile nodes. By means of simulations, we show that the placement recommended by our algorithm significantly reduces the tracking success of the adversary.