Location Privacy in Pervasive Computing
IEEE Pervasive Computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Inferring long-term user properties based on users' location history
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Detecting dynamic communities in opportunistic networks
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Know thy neighbor: towards optimal mapping of contacts to social graphs for DTN routing
INFOCOM'10 Proceedings of the 29th conference on Information communications
GDC: Group Discovery Using Co-location Traces
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Extracting social and community intelligence from digital footprints: an emerging research area
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Toward proximity-aware internetworking
IEEE Wireless Communications
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks
IEEE Transactions on Mobile Computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the security of public key protocols
IEEE Transactions on Information Theory
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Inferring social ties in academic networks using short-range wireless communications
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
Wireless network operators increasingly deploy WiFi hotspots and low-power, low-range base stations in order to satisfy users' growing demands for context-aware services and performance. In addition to providing better service, such capillary infrastructure deployment threatens users' privacy with respect to their social ties and communities, as it allows infrastructure owners to infer users' daily social encounters with increasing accuracy, much to the detriment of their privacy. Yet, to date, there are no evaluations of the privacy of communities in pervasive wireless networks. In this paper, we address the important issue of privacy in pervasive communities by experimentally evaluating the accuracy of an adversary-owned set of wireless sniffing stations in reconstructing the communities of mobile users. During a four-month trial, 80 participants carried mobile devices and were eavesdropped on by an adversarial wireless mesh network on a university campus. To the best of our knowledge, this is the first study that focuses on the privacy of communities in a deployed pervasive network and provides important empirical evidence on the accuracy and feasibility of community tracking in such networks.