EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A model-based WiFi localization method
Proceedings of the 2nd international conference on Scalable information systems
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
ISC '09 Proceedings of the 12th International Conference on Information Security
Distance bounding in noisy environments
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
The Poulidor distance-bounding protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Survey of Wireless Indoor Positioning Techniques and Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
IEEE Transactions on Mobile Computing
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based Services (LBS), personalizing the services they deliver according to the location of the user querying the service. However, the widespread use of mobile equipments, with ever increasing availability, precision, performance and connectivity have introduced the creepy feeling of being continuously monitored, in particular by the providers of the LBS. Thus, beyond the benefits they provide, users have started to be worried about the privacy breaches caused by such systems. The main objective of this paper is to discuss the privacy issues raised by LBS and the challenges of implementing privacy-preserving location-aware systems. Moreover, we also give a brief overview of positioning techniques used by LBS and we introduce the novel concept of locanym, which corresponds to a pseudonym linked to a particular location that could be used as a basis for developing privacy-preserving LBS.