Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Location management strategies increasing privacy in mobile communication
Information systems security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Distributed assignment of encoded MAC addresses in sensor networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Characterizing user behavior and network performance in a public wireless LAN
SIGMETRICS '02 Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Weak duplicate address detection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
A Probabilistic Room Location Service for Wireless Networked Environments
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Location sensing and privacy in a context-aware computing environment
IEEE Wireless Communications
An overview of the challenges and progress in meeting the E-911 requirement for location service
IEEE Communications Magazine
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Protecting privacy with protocol stack virtualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Towards address privacy in mobile ad hoc networks
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Physical Layer Attacks on Unlinkability in Wireless LANs
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
On Address Privacy in Mobile Ad Hoc Networks
Mobile Networks and Applications
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Distributed certificate and application architecture for VANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
Anonymous Communication in Ubiquitous Computing Environments
Wireless Personal Communications: An International Journal
Contextual biometric-based authentication for ubiquitous services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A privacy-preserving secure service discovery protocol for ubiquitous computing environments
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A survey on privacy problems and solutions for VANET based on network model
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Friendship-based location privacy in Mobile Social Networks
International Journal of Security and Networks
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Mitigation of DHCP starvation attack
Computers and Electrical Engineering
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer
Proceedings of the CUBE International Information Technology Conference
Journal of Network and Computer Applications
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
Hi-index | 0.01 |
The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client's position. In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier. While not preventing triangulation per se, it protects against an adversary following a user's movements over time. Design challenges include selecting new interface identifiers, detecting address collisions at the MAC layer, and timing identifier switches to balance network disruptions against privacy protection. Using a modified authentication protocol, network operators can still control access to their network. An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements.