Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Location management strategies increasing privacy in mobile communication
Information systems security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Distributed assignment of encoded MAC addresses in sensor networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Characterizing user behavior and network performance in a public wireless LAN
SIGMETRICS '02 Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Weak duplicate address detection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
A Probabilistic Room Location Service for Wireless Networked Environments
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Analyzing usage of location based services
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
Location sensing and privacy in a context-aware computing environment
IEEE Wireless Communications
An overview of the challenges and progress in meeting the E-911 requirement for location service
IEEE Communications Magazine
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
DRAND: distributed randomized TDMA scheduling for wireless ad-hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Applying privacy on the dissemination of location information
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Privacy management for secure mobility
Proceedings of the 5th ACM workshop on Privacy in electronic society
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
On an information theoretic approach to model anonymous MANET communications
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Enabling location privacy and medical data encryption in patient telemonitoring systems
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
A statistical traffic pattern discovery system for MANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Enhancing WLAN location privacy using mobile behavior
Expert Systems with Applications: An International Journal
Harvesting of location-specific information through wifi networks
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Share the secret: enabling location privacy in ubiquitous environments
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
A new scheme for the location information protection in mobile communication environments
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client's position. In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier. The described system curbs the adversary's ability to continuously track a client's position. Design challenges include selecting new interface identifiers, detecting address collisions at the MAC layer, and timing identifier switches to balance network disruptions against privacy protection. Using a modified authentication protocol, network operators can still control access to their network. An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements.