Towards Modeling Wireless Location Privacy

نویسندگان

  • Leping Huang
  • Hiroshi Yamane
  • Kanta Matsuura
  • Kaoru Sezaki
چکیده

The lack of a formal model in wireless location privacy protection research makes it difficult to evaluate new location privacy protection proposals, and difficult to utilize existing research results in anonymous communication into this new problem. In this paper, we analyze a wireless location privacy protection system (WLP S), and generalize it to a MIX based formal model, which includes a MIX, a set of MIX’s user, and a intruder of MIX. In addition, we also use information theory approach to define anonymity and measures of this model, and describe the characteristics of observation process in WLP S in detail. Two benefits arise from our model. Firstly, it provides a means of evaluating the privacy level of proposed location privacy protection protocols. We use the measures of proposed formal model to study the performance of our novel silent period technique. Simulation results reveal the role of many parameters-such as users’ mobility pattern and intruders’ tracking accuracyon users’ privacy level. The results shed more light on improving our defense protocol. Secondly, our approach provides a link between existing defense and attack protocols in MIX research and the new location privacy protection problem. By utilizing the formal model, we conducted preliminary studies in identifying potential attacks, and improve the performance of existing defense protocol. This study results an extension of existing defense protocols. Those simulation and analytical results demonstrates the promising potential of our model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Achieving Personalized Privacy for Location-Based Services

With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBSs). Although LBSs provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Consequently, location data of individuals used by such services must be adequately protected. Such services will require newmodels for ...

متن کامل

Towards User Defined Privacy in Location- Aware Platforms

The basic concept of the “Wireless Internet” is a system by which users are offered easy and efficient access to the Internet from small, convenient handheld devices. It is predicted that this will open a huge market for location-aware services. But Internet subscribers are already concerned about their privacy. Therefore location-aware services will only succeed if the privacy of the user can ...

متن کامل

Preventing Attacks from Eavesdropper Using HMAC Protocol in Wireless Sensor Networks

A wireless sensor network (WSN) is composed of numerous small sensing devices with limited communication range. The sensors collect data from the environment and report them to the sinks. With the promising sensing and wireless technologies, sensor networks are expected to be widely deployed in a broad spectrum of civil and military applications. Location information of the sinks, the sensors, ...

متن کامل

Location Privacy in Mobile IPv6

The Mobile IPv6 protocol includes a route optimization mechanism that improves routing efficiency by informing correspondent nodes about the current care-of address of the mobile node. Mobile node physical location may be associated with its topologically correct IP address. Revealing the mobile node’s care-of address can therefore be used to track the mobile with certain accuracy, which compro...

متن کامل

A Review of Privacy Preserving Techniques in Wireless Sensor Network

This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005