Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
EHAC'09 Proceedings of the 8th WSEAS international conference on Electronics, hardware, wireless and optical communication
Using Context Annotated Mobility Profiles to Recruit Data Collectors in Participatory Sensing
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
IEEE Transactions on Wireless Communications
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
A location-aware secure interworking architecture between 3GPP and WLAN systems
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
MILC: A secure and privacy-preserving mobile instant locator with chatting
Information Systems Frontiers
Journal of Network and Computer Applications
A personality based design approach using subgroup discovery
HCSE'12 Proceedings of the 4th international conference on Human-Centered Software Engineering
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.25 |
How to protect location privacy of mobile users is an important issue in ubiquitous computing. However, location privacy protection is particularly challenging: on one hand, the administration requires all legitimate users to provide identity information in order to grant them permission to use its wireless service; on the other hand, mobile users would prefer not to expose any information that could enable anyone, including the administration, to get some clue regarding their whereabouts; mobile users would like to have complete personal control of their location privacy. To address this issue, we propose an authorized-anonymous-ID-based scheme; this scheme effectively eliminates the need for a trusted server or administration, which is assumed in the previous work. Our key weapon is a cryptographic technique called blind signature, which is used to generate an authorized anonymous ID that replaces the real ID of an authorized mobile device. With authorized anonymous IDs, we design an architecture capable of achieving complete personal control over location privacy while maintaining the authentication function required by the administration.