Mobility improves coverage of sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Accuracy characterization for metropolitan-scale Wi-Fi localization
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A wireless LAN-based indoor positioning technology
IBM Journal of Research and Development
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
The coverage problem in a wireless sensor network
Mobile Networks and Applications
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Location Fingerprint Analyses Toward Efficient Indoor Positioning
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Realistic mobility simulation of urban mesh networks
Ad Hoc Networks
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Double mobility: coverage of the sea surface with mobile sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Risks of using AP locations discovered through war driving
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Coverage in wireless ad hoc sensor networks
IEEE Transactions on Computers
Geolocation in ad hoc networks using DS-CDMA and generalized successive interference cancellation
IEEE Journal on Selected Areas in Communications
Why mobile-to-mobile wireless malware won't cause a storm
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Automatic inference of movements from contact histories
Proceedings of the ACM SIGCOMM 2011 conference
SEC'11 Proceedings of the 20th USENIX conference on Security
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
Smartphone security limitations: conflicting traditions
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
Toward early warning against Internet worms based on critical-sized networks
Security and Communication Networks
Sense-And-Trace: a privacy preserving distributed geolocation tracking system
SP'12 Proceedings of the 20th international conference on Security Protocols
Hi-index | 0.00 |
Digital wireless radios broadcast identification numbers that uniquely identify them. As has been previously observed, given the ubiquity with which people carry smartphones with their embedded WiFi radios powered on, comes the ability to track individuals' movements. The ability to use wireless radios for positioning has been previously observed and developed in to useful products. In these systems a user willingly geolocates themselves by providing identifiers to infrastructure hardware. In this paper we consider the converse question: what rates of monitoring by smartphones devices in a given metropolitan area are necessary to achieve different levels of involuntary geolocation. While previous work has looked at countermeasure that attempt to maintain privacy, no work has attempted to quantify the problem and risks. Using appropriate simulations we give the first quantitative support for the number and conditions of tracking devices necessary to track the locations of non-participant individuals in urban environments. We provide evidence that a small, but not insignificant, number of mobile devices can be used to track a majority of users during a significant fraction of their travel with current devices. We conclude that in the immediate future, malnets would require relatively high infection rates to pose a significant threat, but that voluntary networks, with perceived benefit can probably achieve the usage rates necessary to track individual movements of non-subscribed users to a high-degree of accuracy. Our results also suggest ubiquitous deployment of 802.11n in smartphones would make geolocation feasible by malnets