Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
Introduction to Algorithms
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
IEEE Security and Privacy
Measuring ISP topologies with rocketfuel
IEEE/ACM Transactions on Networking (TON)
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
The devil and packet trace anonymization
ACM SIGCOMM Computer Communication Review
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
A community based mobility model for ad hoc network research
REALMAN '06 Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality
SC2D: an alternative to trace anonymization
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Mining behavioral groups in large wireless LANs
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Issues and etiquette concerning use of shared measurement data
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Extract: mining social features from WLAN traces--a gender-based case study
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Hi-index | 0.01 |
With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The availability of these trace libraries can be quite useful to provide realistic models of network load and user mobility, among others. To maintain user privacy, techniques of trace anonymization may be used to hide information. In this paper, we propose to study the fundamental trade off between the utility of WLAN traces and its privacy. The study provides several realistic case studies in which privacy attacks may be conducted, and questions the efficacy of existing anonymization techniques. Our initial quantitative analysis to estimate mobile users' k-anonymity in WLAN traces shows surprisingly unique usage patterns, which may compromise anonymity. The main contribution of this paper is to articulate the compelling challenges facing anonymization of wireless networks traces and to shed some light on the answer to a most intriguing question: Just how private are wireless network traces?