Filters








2,320 Hits in 3.2 sec

Preserving location privacy in wireless lans

Tao Jiang, Helen J. Wang, Yih-Chun Hu
2007 Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07  
In this paper, we analyze the problem of location privacy in wireless networks and present a protocol for improving location privacy.  ...  We evaluated our system based on real-life mobility data and wireless LAN coverage. Our results show that a user of our system can be indistinguishable from a thousand users in the same coverage area.  ...  CONCLUDING REMARKS In this paper, we have given a thorough treatment to the problem of location privacy in wireless LANs, where users' location information can be inferred from their wireless transmissions  ... 
doi:10.1145/1247660.1247689 dblp:conf/mobisys/JiangWH07 fatcat:4abc6crm2nhvtpo5xt5yx3vjke

Enhancing location privacy in wireless LAN through disposable interface identifiers

Marco Gruteser, Dirk Grunwald
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier.  ...  The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client's position.  ...  Wireless LAN location privacy challenges In the United States, privacy risks related to location information have been identified in the Location Privacy Protection Act of 2001 [26] .  ... 
doi:10.1145/941332.941334 fatcat:jjh3buxwerhjpioiowarokh3ta

Enhancing location privacy in wireless LAN through disposable interface identifiers

Marco Gruteser, Dirk Grunwald
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier.  ...  The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client's position.  ...  Wireless LAN location privacy challenges In the United States, privacy risks related to location information have been identified in the Location Privacy Protection Act of 2001 [26] .  ... 
doi:10.1145/941326.941334 dblp:conf/wmash/GruteserG03 fatcat:273obxyxhneifg4tvqb7iqbsqi

Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis

Marco Gruteser, Dirk Grunwald
2005 Journal on spesial topics in mobile networks and applications  
In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier.  ...  The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client's position.  ...  Wireless LAN location privacy challenges In the United States, privacy risks related to location information have been identified in the Location Privacy Protection Act of 2001 [26] .  ... 
doi:10.1007/s11036-005-6425-1 fatcat:vw7i6j7qfrd2nl3hqne6ypet4a

Author index

2013 38th Annual IEEE Conference on Local Computer Networks  
: An Efficient and Privacy Preserving Revocation System Using Parked Vehicles Egners, André Experiences From Security Research Using a Wireless Mesh Network Testbed El Mougy, Amr On Resource Management  ...  Status Monitoring in Sensor Networks Using Adaptive Piggybacking Faster Distributed Localization of Large Numbers of Nodes Using Clustering SmartRevoc: An Efficient and Privacy Preserving Revocation  ... 
doi:10.1109/lcn.2013.6761235 fatcat:lcoo2auxgjeirmddevnhp5henq

Privacy Preserving in Data Mining to Protect Privileged information in Adhoc Network

Dillip Kumar Swain
2016 International Journal Of Engineering And Computer Science  
We have also proposed a technique for privacy preservation of privileged information in case of an Ad-hoc network.  ...  The network may be wired or wireless and the network may be ad-hoc, pear to pear or distributed network privacy of data is an important factor in each case.  ...  CONCLUSION AND FUTURE WORK Privacy preservation is a major issue in each type of network. Starting from wire to wireless and LAN to WAN in each network security of data is very much essential.  ... 
doi:10.18535/ijecs/v5i10.19 fatcat:vayy6y2dxzeptmmekyzweubsoa

IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Party-based Location-based Services Systems

Muhammad Usman Ashraf, Kamal M., Rida Qayyum, Hina Ejaz
2020 International Journal of Advanced Computer Science and Applications  
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it.  ...  In TTP based LBS system, a user's privacy is concerned with personal identity, location information, and time information.  ...  Kamal m Jambi for technical and financial support in this research.  ... 
doi:10.14569/ijacsa.2020.0110773 fatcat:adq2jv6rlzgkppbcp52rwue3ru

A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks [chapter]

Marco Gruteser, Dirk Grunwald
2004 Lecture Notes in Computer Science  
In a case study, we apply the approach to IEEE 802.11b wireless LAN networks and location-based services, where it reveals significant location privacy concerns through link-and application-layer information  ...  Thus, this paper presents a methodology for identifying, assessing, and comparing location privacy risks in mobile computing technologies.  ...  Watson Research Center encouraged me to research location privacy challenges. The anonymous referees provided useful comments on a draft of this paper.  ... 
doi:10.1007/978-3-540-39881-3_5 fatcat:4hy6lvhgz5gzpkk6mfmiygdnju

Table of contents

2021 IEEE Internet of Things Journal  
Gan 14308 Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT . . . . . . . . . . . . . . . . .  ...  Gorlatova 14110 Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2021.3102779 fatcat:hxmkbro5bvhafandsqroibkewe

Ground Rules of Wireless LAN Security

2016 International Journal of Science and Research (IJSR)  
They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came with expensive price to pay in areas of security of the network.  ...  Wired Equivalent Privacy (WEP) was the first logical solution to secure WLANs.  ...  In order to improve wireless LAN security the 802.11i is considering inclusion of AES in WEPv2. Paper ID: NOV162196  ... 
doi:10.21275/v5i3.nov162196 fatcat:fij2occ76fa6pd6jincgitjima

Advanced and Applications in Vehicular Ad Hoc Networks

Han-Chieh Chao, Yuh-Shyan Chen, Yueh Min Huang
2009 Journal on spesial topics in mobile networks and applications  
Recently there is a strong interest in developing networking techniques and important applications for moving vehicles, to enable wireless communication between roadside and vehicles or between vehicles  ...  Vehicular ad hoc networks (VANETs) using all kinds of wireless technologies has recently received considerable attention.  ...  "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks" by Vincent W.S.  ... 
doi:10.1007/s11036-009-0216-z fatcat:nsv7hg4mere7djvtnakvqbycce

STAMP: Enabling Location Privacy for Mobile Users While Using Public Wi-Fi

Navya Davis
2018 International Journal for Research in Applied Science and Engineering Technology  
It is used for ad-hoc mobile users generating location proofs in distributed settings. It is accommodating wireless access points and trusted mobile users.  ...  The malicious can access our location. In this paper we propose a Spatial Temporal Provenance Assurance with Mutual Proofs (STAMP).  ...  The experimental results show that, besides providing location proof, which can preserve the source location privacy. In Sebastien Gambs et al.'  ... 
doi:10.22214/ijraset.2018.3129 fatcat:mxrseac2tvdjhle6gzyd4arj4y

Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking"

Jong Hyuk Park, Han-Chieh Chao, Whai-En Chen, Paris Kitsos
2008 Wireless personal communications  
While attack methods and tools have become more and more powerful, interest has greatly increased in the field of building, active and smart defense systems.  ...  This Call for Papers attracted 32 submissions from Asia, Europe and the US covering a lot of topics in the field of the FGCN. Each paper was carefully evaluated by three reviewers.  ...  "Fault-tolerance Data Aggregation for Clustering Wireless Sensor Network" by Shu Qin Ren and Jong Sou Park proposes an efficient privacy-preserving data fusions as well as malicious data tolerance.  ... 
doi:10.1007/s11277-008-9594-y fatcat:v5ehvvsmcvbihaeufinzy57fiu

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN's and Mobile Devices

P. Sanyasi, Jagadish Gurrala
2016 International Journal of Computer Applications  
After rigorous research funding into this area leads to regulate the access that resources preserved in particular locations. Therefore we improve the development of security from location.  ...  This paper leaves several ideas for researchers to mitigate issues in location privacy and authentication areas for better future.  ...  The authors would like to thank Dr.K.V.S.V.N.Raju, Professor & Director (R&D),Anil Neerukonda Institute Of Technology &Sciences,Visakhapatnam, for his great effort in helping to shaping the paper and proofreading  ... 
doi:10.5120/ijca2016910829 fatcat:ap66hq3osbbmliupalivw3mivm

Smart Home Survey on Security and Privacy [article]

Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Łukasz Krzywiecki, Nalini Venkatasubramanian
2019 arXiv   pre-print
This article shows security requirements and threats to a smart home and focuses on a privacy-preserving security model.  ...  Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern.  ...  Some home devices send data to cloud, and this data needs to be accessed in a privacy-preserving manner.  ... 
arXiv:1904.05476v2 fatcat:j76pppfzkjgb3hcifdvj34pkea
« Previous Showing results 1 — 15 out of 2,320 results